Leak-resistant cryptographic payment smartcard

We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.

Skip to: Description  ·  Claims  ·  References Cited  · Patent History  ·  Patent History
Description
RELATED APPLICATIONS

This application is a divisional of U.S. patent application Ser. No. 09/737,182 filed on Dec. 13, 2000, now U.S. Pat. No. 6,381,699 which is a divisional of U.S. patent application Ser. No. 09/224,682 (now U.S. Pat. No. 6,304,658) filed on Dec. 31, 1998, which claimed the benefit of U.S. provisional patent application Ser. No. 60/070,344 filed on Jan. 2, 1998, and U.S. provisional patent application Ser. No. 60/089,529 filed on Jun. 15, 1998.

TECHNICAL FIELD

This application relates generally to cryptographic systems and, more specifically, to securing cryptographic tokens that must maintain the security of secret information in hostile environments.

BACKGROUND

Most cryptosystems require secure key management. In public-key based security systems, private keys must be protected so that attackers cannot use the keys to forge digital signatures, modify data, or decrypt sensitive information. Systems employing symmetric cryptography similarly require that keys be kept secret. Well-designed cryptographic algorithms and protocols should prevent attackers who eavesdrop on communications from breaking systems. However, cryptographic algorithms and protocols traditionally require that tamper-resistant hardware or other implementation-specific measures prevent attackers from accessing or finding the keys.

If the cryptosystem designer can safely assume that the key management system is completely tamper-proof and will not reveal any information relating to the keys except via the messages and operations defined in the protocol, then previously known cryptographic techniques are often sufficient for good security. It is currently extremely difficult, however, to make hardware key management systems that provide good security, particularly in low-cost unshielded cryptographic devices for use in applications where attackers will have physical control over the device. For example, cryptographic tokens (such as smartcards used in electronic cash and copy protection schemes) must protect their keys even in potentially hostile environments. (A token is a device that contains or manipulates cryptographic keys that need to be protected from attackers. Forms in which tokens may be manufactured include, without limitation, smartcards, specialized encryption and key management devices, secure telephones, secure picture phones, secure web servers, consumer electronics devices using cryptography, secure microprocessors, and other tamper-resistant cryptographic systems.)

A variety of physical techniques for protecting cryptographic devices are known, including enclosing key management systems in physically durable enclosures, coating integrated circuits with special coatings that destroy the chip when removed, and wrapping devices with fine wires that detect tampering. However, these approaches are expensive, difficult to use in single-chip solutions (such as smartcards), and difficult to evaluate since there is no mathematical basis for their security. Physical tamper resistance techniques are also ineffective against some attacks. For example, recent work by Cryptography Research has shown that attackers can non-invasively extract secret keys using careful measurement and analysis of many devices' power consumption. Analysis of timing measurements or electromagnetic radiation can also be used to find secret keys.

Some techniques for hindering external monitoring of cryptographic secrets are known, such as using power supplies with large capacitors to mask fluctuations in power consumption, enclosing devices in well-shielded cases to prevent electromagnetic radiation, message blinding to prevent timing attacks, and buffering of inputs/outputs to prevent signals from leaking out on I/O lines. Shielding, introduction of noise, and other such countermeasures are often, however, of limited value, since skilled attackers can still find keys by amplifying signals and filtering out noise by averaging data collected from many operations. Further, in smartcards and other tamper-resistant chips, these countermeasures are often inapplicable or insufficient due to reliance on external power sources, impracticality of shielding, and other physical constraints. The use of blinding and constant-time mathematical algorithms to prevent timing attacks is also known, but does not prevent more complex attacks such as power consumption analysis (particularly if the system designer cannot perfectly predict what information will be available to an attacker, as is often the case before a device has been physically manufactured and characterized).

The techniques disclosed herein make use of previously-known cryptographic primitives and operations. For example: U.S. Pat. No. 5,136,646 to Haber et al. and the pseudorandom number generator used in the RSAREF cryptographic library use repeated application of hash functions; anonymous digital cash schemes use blinding techniques; zero knowledge protocols use hash functions to mask information; and key splitting and threshold schemes store secrets in multiple parts.

SUMMARY

This application introduces leak-proof and leak-resistant cryptography, mathematical approaches to tamper resistance that support many existing cryptographic primitives, are inexpensive, can be implemented on existing hardware (whether by itself or via software capable of running on such hardware), and can solve problems involving secrets leaking out of cryptographic devices. Rather than assuming that physical devices will provide perfect security, leak-proof and leak-resistant cryptographic systems may be designed to remain secure even if attackers are able to gather some information about the system and its secrets. This application describes leak-proof and leak-resistant systems that implement symmetric authentication, Diffie-Hellman exponential key agreement, ElGamal public key encryption, ElGamal signatures, the Digital Signature Standard, RSA, and other algorithms.

One of the characteristic attributes of a typical leak-proof or leak-resistant cryptosystem is that it is “self-healing” such that the value of information leaked to an attacker decreases or vanishes with time. Leak-proof cryptosystems are able to withstand leaks of up to LMAX bits of information per transaction, where LMAX is a security factor chosen by the system designer to exceed to the maximum anticipated leak rate. The more general class of leak-resistant cryptosystems includes leak-proof cryptosystems, and others that can withstand leaks but are not necessarily defined to withstand any defined maximum information leakage rate. Therefore, any leak-proof system shall also be understood to be leak-resistant. The leak-resistant systems disclosed herein can survive a variety of monitoring and eavesdropping attacks that would break traditional (non-leak-resistant) cryptosystems.

A typical leak-resistant cryptosystem disclosed herein consists of three general parts. The initialization or key generation step produces secure keying material appropriate for the scheme. The update process cryptographically modifies the secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system, thus providing security advantages over systems of the background art. The final process performs cryptographic operations, such as producing digital signatures or decrypting messages.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an exemplary leak-resistant symmetric authentication method.

FIG. 2 shows an exemplary leak-resistant Diffie-Hellman exponential key exchange operation.

FIG. 3 shows an exemplary leak-resistant RSA private key operation.

FIG. 4 shows an exemplary leak-resistant ElGamal signing operation.

DETAILED DESCRIPTION

U.S. Pat. No. 6,304,658 and copending U.S. patent application Ser. No. 09/737,182 are hereby incorporated herein by reference in their entirety.

The sections following will describe an introduction to leak-proof/leak-resistant cryptography, followed by various embodiments of the general techniques disclosed herein as applied to improve the security of common cryptographic protocols.

I. Introduction and Terminology

The leakage rate L is defined as the number of bits of useful information about a cryptosystem's secrets that are revealed per operation, where an operation is a cryptographic transaction. Although an attacker may be able to collect more than L bits worth of measurement data, by definition this data yields no more than L bits of useful information about the system's secrets.

The implementer of a leak-proof system chooses a design parameter LMAX, the maximum amount of leakage per operation the system may allow if it is to remain uncompromised. LMAX should be chosen conservatively, and normally should significantly exceed the amount of useful information known to be leaked to attackers about the system's secrets during each transaction. Designers do not necessarily need to know accurately or completely the quantity and type of information that may leak from their systems; the choice of LMAX may be made using estimates and models for the system's behavior. General factors affecting the choice of LMAX include the types of monitoring potentially available to attackers, the amount of error in attackers' measurements, and engineering constraints that limit LMAX. (Larger values of LMAX increase memory and performance requirements of the device, and in some cases may increase L.) To estimate the amount of useful information an attacker could collect by monitoring a device's power consumption, for example, a designer might consider the amount of noise in the device's power usage, the power line capacitance, the useful time resolution for power consumption measurements, as well as the strength of the signals being monitored. Similarly, the designer knows that timing measurements can rarely yield more than a few bits of information per operation, since timing information is normally quantized to an integral number of clock cycles. In choosing LMAX, the designer should assume that attackers will be able to combine information gleaned from multiple types of attacks. If the leakage rate is too large (as in the extreme case where L equals the key size because the entire key can be extracted during a single transaction), additional design features should be added to reduce L and reduce the value needed for LMAX. Such additional measures can include known methods, such as filtering the device's power inputs, adding shielding, introducing noise into the timing or power consumption, implementing constant-time and constant execution path algorithms, and changing the device layout. Again, note that the designer of a leak-resistant system does not actually need to know what information is being revealed or how it is leaked; all he or she need do is choose an upper bound for the rate at which attackers might learn information about the keys. In contrast, the designer of a traditional system faces the much harder task of ensuring that no information about the secrets will leak out.

There are many ways information about secrets can leak from cryptosystems. For example, an attacker can use a high-speed analog-to-digital converter to record a smartcard's power consumption during a cryptographic operation. The amount of useful information that can be gained from such a measurement varies, but it would be fairly typical to gain enough information to guess each of 128 key bits correctly with a probability of 0.7. This information can reduce the amount of effort required for a brute force attack. For example, a brute force attack with one message against a key containing k bits where each bit's value is known with probability p can be completed in

E ( k , p ) = i = 0 k [ ( k i ) ( 1 - p ) i p k - i [ ( j = 0 i ( k j ) ) - 1 2 ( k i ) ] + 1 2 ]
operations. The reduction in the effort for a brute force attack is equivalent to shortening the key by L=log2(E(k,½)/E(k,p))=log2(k−E(k,p)−1) bits. (For example, in the case of k=128 and p=0.7, L is estimated to be about 11 bits for the first measurement. With a multiple message attack, the attacker's effort can fall to as low as

E ( k , p ) = 1 p k . )
Attackers can gain additional information about the keys by measuring additional operations; unless leak-resistance is used, finding the key becomes easy after just a few dozen operations.

When choosing LMAX, a system designer should consider the signal-to-noise ratio of an attacker's measurements. For example, if the signal and noise are of roughly equivalent magnitude, the designer knows that an attacker's measurements should be incorrect about 25 percent of the time (e.g., p=0.75 if only one observation per key bit is possible). Many measurement techniques, such as those involving timing, may have signal-to-noise ratios of 1:100 or worse. With such systems, L is generally quite small, but attackers who can make a large number of measurements can use averaging or other statistical techniques to recover the entire key. In extreme cases, attackers may be able to obtain all key bits with virtually perfect accuracy from a single transaction (i.e., L=k), necessitating the addition of shielding, noise in the power consumption (or elsewhere), and other measures to reduce p and L. Of course, LMAX should be chosen conservatively; in the example above where less than 4 useful bits are obtained per operation for the given attack, the designer might select LMAX=64 for a leak-proof design.

Leak-proof (and, more generally, leak-resistant) cryptosystems provide system designers with important advantages. When designing a traditional (i.e., non-leak-resistant and non-leak-proof) cryptosystem, a careful cryptosystem designer should study all possible information available to attackers if he or she is to ensure that no analytical techniques could be used to compromise the keys. In practice, many insecure systems are developed and deployed because such analysis is incomplete, too difficult even to attempt, or because the cryptographers working on the system do not understand or cannot completely control the physical characteristics of the device they are designing. Unexpected manufacturing defects or process changes, alterations made to the product by attackers, or modifications made to the product in the field can also introduce problems. Even a system designed and analyzed with great care can be broken if new or improved data collection and analysis techniques are found later. In contrast, with leak-proof cryptography, the system designer only needs to define an upper bound on the maximum rate at which attackers can extract information about the keys. A detailed understanding of the information available to attackers is not required, since leak-proof (and leak-resistant) cryptosystem designs allow for secret information in the device to leak out in (virtually) any way, yet remain secure despite this because leaked information is only of momentary value.

In a typical leak-proof design, with each new cryptographic operation i, the attacker is assumed to be able to choose any function Fi and determine the LMAX-bit result of computing Fi on the device's secrets, inputs, intermediates, and outputs over the course of the operation. The attacker is even allowed to choose a new function Fi with each new operation. The system may be considered leak-proof with a security factor n and leak rate LMAX if, after observing a large number of operations, an attacker cannot forge signatures, decrypt data, or perform other sensitive operations without performing an exhaustive search to find an n-bit key or performing a comparable O(2n) operation. In addition to choosing LMAX, designers also choose n, and should select a value large enough to make exhaustive search infeasible. In the sections that follow, various embodiments, as applied to improve the security of common cryptographic operations and protocols, will be described in more detail.

II. Symmetric Cryptographic Protocols

A. Symmetric Authentication

An exemplary cryptographic protocol that can be secured using one or more of the techniques disclosed herein is symmetric authentication.

1. Conventional Symmetric Authentication

Assume a user wishes to authenticate herself to a server using an n-bit secret key, K, known to both the server and the user's cryptographic token, but not known to attackers. The cryptographic token should be able to resist tampering to prevent, for example, attackers from being able to extract secrets from a stolen token. If the user's token has perfect tamper resistance (i.e., L=0), authentication protocols of the background art can be used. Typically the server sends a unique, unpredictable challenge value R to the user's token, which computes the value A=H(R∥K), where “∥” denotes concatenation and H is a one-way cryptographic hash function such as SHA. The user sends A to the server, which independently computes A (using its copy of K) and compares its result with the received value. The user authentication succeeds only if the comparison operation indicates a match.

If the function H is secure and if K is sufficiently large to prevent brute force attacks, attackers should not be able to obtain any useful information from the (R, A) values of old authentication sessions. To ensure that attackers cannot impersonate users by replaying old values of A, the server generates values of R that are effectively (with sufficiently high probability) unique. In most cases, the server should also make R unpredictable to ensure that an attacker with temporary possession of a token cannot compute future values of A. For example, R might be a 128-bit number produced using a secure random number generator (or pseudorandom number generator) in the server. The properties of cryptographic hash functions such as H have been the subject of considerable discussion in the literature, and need not be described in detail here. Hash functions typically provide functionality modeled after a random oracle, deterministically producing a particular output from any input. Ideally, such functions should be collision-resistant, non-invertable, should not leak partial information about the input from the output, and should not leak information about the output unless the entire input is known. Hash functions can have any output size. For example, MD5 produces 128-bit outputs and SHA produces 160-bit outputs. Hash functions may be constructed from other cryptographic primitives or other hash functions.

While the cryptographic security of the protocol using technology of the background art may be good, it is not leak-proof; even a one-bit leak function (with L=1) can reveal the key. For example, if the leak function F equals bit (R mod n) of K, an attacker can break the system quickly since a new key bit is revealed with every transaction where (R mod n) has a new value. Therefore, there is a need for a leak-proof/leak-resistant symmetric authentication protocol.

2. Leak-Resistant Symmetric Authentication

The following is one embodiment of a leak-resistant (and, in fact, also leak-proof) symmetric authentication protocol, described in the context of a maximum leakage rate of LMAX bits per transaction from the token and a security factor n, meaning that attacks of complexity O(2″), such as brute-force attacks against an n-bit key, are acceptable, but there should not be significantly easier attacks. The user's token maintains a counter t, which is initialized to zero, and an (n+2LMAX)-bit shared secret Kt, which is initialized with a secret K0. Note that against adversaries performing precomputation attacks based on Hellman's time/memory trade-off, larger values of n may be in order. Note also that some useful protocol security features, such as user and/or server identifiers in the hash operation inputs, have been omitted for simplicity in the protocol description. It is also assumed that no leaking will occur from the server. For simplicity in the protocol description, some possible security features (such as user and/or server identifiers in the hash operation inputs) have been omitted, and it is assumed that the server is in a physically secure environment. However, those skilled in the art will appreciate that the techniques are not limited to such assumptions, which have been made as a matter of convenience rather than necessity.

As in the traditional protocol, the server begins the authentication process by generating a unique and unpredictable value R at step 105. For example, R might be a 128-bit output from a secure random number generator. At step 110, the server sends R to the user's token. At step 112, the token receives R. At step 115, the token increments its counter t by computing t←t+1. At step 120, the token updates Kt by computing Kt←HK(t∥Kt), where HK is a cryptographic hash function that produces an (n+2LMAX) bit output from the old value of Kt and the (newly incremented) value of t. Note that in the replacement operations (denoted “←”), the token deletes the old values of t and Kt, replacing them with the new values. By deleting the old Kt, the token ensures that future leak functions cannot reveal information about the old (deleted) value. At step 122, the token uses the new values of t and Kt to compute an authenticator A=HA(Kt∥t∥R). At step 125, the token sends both t and the authenticator A to the server, which receives them at step 130. At step 135, the server verifies that t is acceptable (e.g., not too large but larger than the value received in the last successful authentication). If t is invalid, the server proceeds to step 175. Otherwise, at step 140, the server initializes its loop counter i to zero and its key register Kt′ to K0. At step 145, the server compares i with the received value of t, proceeding to step 160 if they are equal. Otherwise, at step 150, the server increments i by computing i←i+1. At step 155, the server computes Kt′←HK(i∥Kt′), then proceeds back to step 145. At step 160, the server computes A′=HA(Kt′∥t∥R). Finally, at step 165, the server compares A and A′, where the authentication succeeds at step 170 if they match, or fails at 175 if they do not match.

This design assumes that at the beginning of any transaction the attacker may have LMAX bits of useful information about the state of the token (e.g., Kt) that were obtained using the leak function F in a previous operation. During the transaction, the attacker can gain an additional LMAX bits of useful information from the token. If, at any time, any 2LMAX (or fewer) bits of useful information about the secret are known to the attacker, there are still (n+2LMAX)−2LMAX=n or more unknown bits. These n bits of unknown information ensure that attacks will require O(2n) effort, corresponding to the desired security factor. However, the attacker should have no more than LMAX bits of useful information about Kt at the end of the transaction. The property that attackers lose useful information during normal operation of the system is a characteristic of the leak-proof or leak-resistant cryptosystem. In general, this information loss is achieved when the cryptosystem performs operations that convert attackers' useful partial information about the secret into useless information. (Information is considered useless if it gives an attacker nothing better than the ability to test candidate values in an O(2n) exhaustive search or other “hard” operation. For example, if exhaustive search of X is hard and H is a good hash function, H(X) is useless information to an attacker trying to find X.)

Thus, the attacker is assumed to begin with LMAX bits of useful information about Kt before the token's Kt←HK(t∥Kt) computation. (Initial information about anything other than Kt is of no value to an attacker because Kt is the only secret value in the token. The function HK and the value of t are not assumed to be secret.) The attacker's information can be any function of Kt produced from the previous operation's leaks.

3. Security Characteristics of Leak-Proof Systems

The following section provides a technical discussion of the security characteristics of the exemplary leak-proof system described above. The following analysis is provided as an example of how the design can be analyzed, and how a system may be designed using general assumptions about attackers' capabilities. The discussion and assumptions do not necessarily apply to other embodiments and should not be construed as limiting in scope or applicability in any way.

During the course of a transaction, the leak function F might reveal up to LMAX information about the system and its secrets. The design assumes that any information contained in the system may be leaked by F, provided that F does not reveal useful new information about values of Kt that were deleted before the operation started, and F does not reveal useful information about values of Kt that will be computed in future operations. These constraints are completely reasonable, since real-world leaks would not reveal information about deleted or not-yet-existent data. (The only way information about future Kt values could be leaked would be the bizarre case where the leak function itself included, or was somehow derived from, the function HK.) In practice, these constraints on F are academic and of little concern, but they are relevant when constructing proofs to demonstrate the security of a leak-proof system.

If the leak occurs at the beginning of the HK computation, it could give the attacker up to 2LMAX bits of useful information about the input value of Kt. Because Kt contains (2LMAX+n) bits of secret information and the attacker may have up to 2LMAX bits of useful information about the initial value of Kt, there remain at least (2LMAX+n)−2LMAX=n bits of information in Kt that are secret. The hash function HK effectively mixes up these n bits to produce a secure new Kt during each transaction such that the attacker's information about the old Kt is no longer useful.

If the leak occurs at the end of the HK computation, it could give an attacker up to LMAX bits of information about the final value of HK, yielding LMAX bits of information about the input to the subsequent transaction. This is not a problem, since the design assumes that attackers have up to LMAX bits of information about Kt at the beginning of each transaction.

A third possibility is that the attacker's LMAX bits of information might describe intermediates computed during the operation HK. However, even if the attacker could obtain LMAX new bits of information about the input to HK and also LMAX bits of information about the output from HK, the system would be secure, since the attacker would never have more than 2LMAX bits of information about the input Kt or more than LMAX bits of information about the output Kt. Provided that LMAX bits of information from within HK cannot reveal more than LMAX bits of information about the input, or more than LMAX bits of information about the output, the system will be secure. This will be true unless HK somehow compresses the input to form a short intermediate which is expanded to form the output. While hash functions whose internal states are smaller than their outputs should not be used, most cryptographic hash functions are fine.

A fourth possibility is that part or all of the leak could occur during the A=HA(Kt∥t∥R) calculation. The attacker's total “budget” for observations is LMAX bits. If L1 bits of leak occur during the HK computation, an additional L2 bits of information can leak during the A=HA(Kt∥t∥R) operation, where L2≦LMAX−L1. If the second leak provides information about Kt, this is no different from leaking information about the result of the HK computation; the attacker will still conclude the transaction with no more than LMAX bits of information about Kt because L1+L2≦LMAX. However, the second leak could reveal information about A. To keep A secure against leaks (to prevent, for example, an attacker from using a leak to capture A and using A before the legitimate user can), the size of A should include an extra LMAX bits (to provide security even if L2=LMAX). Like HK, HA should not leak information about deleted or future values of Kt that are not used in or produced by the given operation. As with the similar assumptions on leaks from HK, this limitation is primarily academic and of little practical concern, since real-world leak functions do not reveal information about deleted or not-yet-computed data. However, designers might be cautious when using unusual designs for HA that are based on or derived from HK, particularly if the operation HA(Kt∥t∥R) could reveal useful information about the result of computing HK(t∥Kt).

B. Other Leak-Resistant Symmetric Schemes

The same basic technique of updating a key (K) with each transaction, such that leakage about a key during one transaction does not reveal useful information about a key in a subsequent (or past) transaction, can be easily extended to other applications besides authentication.

1. Symmetric Data Verification

For example and without limitation, leak-resistant symmetric data verification is often useful where a device needs to support symmetrically-signed code, data, content, or parameter updates (all of which will, as a matter of convenience, be denoted as “data” herein). In existing systems, a hash or MAC of the data is typically computed using a secret key and the data is rejected if computed hash or MAC does not match a value received with the data. For example, a MAC may be computed as HMAC(K, data), where HMAC is defined in “RFC 2104, HMAC: Keyed-Hashing for Message Authentication” by H. Krawczyk, M. Bellare, and R. Canetti, 1997. Traditional (non-leak-resistant) designs are often vulnerable to attacks including power consumption analysis of MAC functions and timing analysis of comparison operations.

In an exemplary leak-resistant verification protocol, a verifying device (the “verifier”) maintains a counter t and a key Kt, which are initialized (for example at the factory) with t∥0 and Kt∥K0. Before the transaction, the verifier provides t to the device providing the signed data (the “signer”), which also knows K0. The signer uses t to compute Kt+1′ (the prime indicating a quantity derived by the signer, rather than at the verifier) from K0 (or Kt′ or any other available value of Ki′). using the relation Ki′=HK(i∥Ki−1′), computes signature S′=HMAC(Kt+1′, data), and sends S′ plus any other needed information (such as data or t) to the verifier. The verifier confirms that the received value of t (if any) matches its value of t, and rejects the signature if it does not. If t matches, the verifier increments t and updates Kt in its nonvolatile memory by computing t∥t+1 and Kt∥HK(t∥Kt). In an alternative embodiment, if the received value of t is larger than the internal value but the difference is not unreasonably large, it may be more appropriate to accept the signature and perform multiple updates to Kt (to catch up with the signer) instead of rejecting the signature outright. Finally, the verifier computes S=HMAC(Kt, data) and verifies that S=S′, rejecting the signature if S does not equal the value of S′ received with the data.

2. Symmetric Encryption

Besides authentication and verification, leak-resistant symmetric cryptography can also be tailored to a wide variety of applications and environments. For example, if data encryption is desired instead of authentication, the same techniques as were disclosed above may be used to generate a key Kt used for encryption rather than verification.

3. Variations in Computational Implementation

In the foregoing, various applications were disclosed for the basic technique of updating a key Kt in accordance with a counter and deleting old key values to ensure that future leakage cannot reveal information about the now-deleted key. Those skilled in the art will realize, however, that the exemplary techniques described above may be modified in various ways. For example, if communications between the device and the server are unreliable (for example if the server uses voice recognition or manual input to receive t and A), then small errors in the signature may be ignored. (One skilled in the art will appreciate that many functions may be used to determine whether a signature corresponds—sufficiently closely—to its expected value.) In another variation of the basic technique, the order of operations and of data values may be adjusted, or additional steps and parameters may be added, without significantly changing the spirit of the general techniques disclosed herein. In another variation, to save on communication bandwidth or memory, the high order bits or digits of t may not need to be communicated or remembered. In another variation, as a performance optimization, devices need not recompute Kt from K0 with each new transaction. For example, when a transaction succeeds, the server can discard K0 and maintain the validated version of Kt. In another variation, if bi-directional authentication is required, the protocol can include a step whereby the server can authenticates itself to the user (or user's token) after the user's authentication is complete. In another variation, if the server needs to be secured against leaks as well (as in the case where the role of “server” is played by an ordinary user), it can maintain its own counter t. In each transaction, the parties agree to use the larger of their two t values, where the device with the smaller t value performs extra updates to Kt to synchronize t. In an alternate embodiment for devices that contain a clock and a reliable power source (e.g., battery), the update operation may be performed periodically, for example by computing Kt←HK(t∥Kt) once per second. The token uses the current Kt to compute A=HA(Kt∥t∥R) or, if the token does not have any means for receiving R, it can output A=HA(Kt). The server can use its clock and local copy of the secret to maintain its own version of Kt, which it can use to determine whether received values of A are recent and correct. All of the foregoing show that the methods and apparatuses can be implemented using numerous variations and modifications to the exemplary embodiments described herein, as would be understood by one skilled in the art.

III. Asymmetric Cryptographic Protocols

The foregoing illustrates various embodiments that may be used with symmetric cryptographic protocols. As will be seen below, still other techniques may be used in connection with asymmetric cryptographic operations and protocols. While symmetric cryptosystems are sufficient for some applications, asymmetric cryptography is required for many applications. There are several ways leak resistance can be incorporated into public key cryptosystems, but it is often preferable to have as little impact as possible on the overall system architecture. Most of the exemplary designs have thus been chosen to incorporate leak resistance into widely used cryptosystems in a way that only alters the key management device, and does not affect the certification process, certificate format, public key format, or processes for using the public key.

A. Certified Diffie-Hellman

Diffie-Hellman exponential key exchange is a widely used asymmetric protocol whereby two parties who do not share a secret key can negotiate a shared secret key. Implementations of Diffie-Hellman can leak information about the secret exponents, enabling attackers to determine the secret keys produced by those implementations. Consequently, a leak-resistant implementation of Diffie-Hellman would be useful. To understand such a leak-resistant implementation, it will be useful to first review a conventional Diffie-Hellman implementation.

1. Conventional Certified Diffie-Hellman

Typical protocols in the background art for performing certified Diffie-Hellman exponential key agreement involve two communicating users (or devices) and a certifying authority (CA). The CA uses an asymmetric signature algorithm (such as DSA) to sign certificates that specify a user's public Diffie-Hellman parameters (the prime p and generator g), public key (px mod g, where x is the user's secret exponent), and auxiliary information (such as the user's identity, a description of privileges granted to the certificate holder, a serial number, expiration date, etc.). Certificates may be verified by anyone with the CA's public signature verification key. To obtain a certificate, user U typically generates a secret exponent (xu), computes his or her own public key yu=gxu mod p, presents yu along with any required auxiliary identifying or authenticating information (e.g., a passport) to the CA, who issues the user a certificate Cu. Depending on the system, p and g may be unique for each user, or they may be system-wide constants (as will be assumed in the following description of Diffie-Hellman using the background art).

Using techniques of the background art, Alice and Bob can use their certificates to establish a secure communication channel. They first exchange certificates (CAlice and CBob). Each verifies that the other's certificate is acceptable (e.g., properly formatted, properly signed by a trusted CA, not expired, not revoked, etc.). Because this protocol will assume that p and g are constants, they also check that the certificate's p and g match the expected values. Alice extracts Bob's public key (yBob) from CBob and uses her secret exponent (xAlice) to compute zAlice=(yBob)xAlice mod p. Bob uses his secret exponet and Alice's public key to compute zBob=(yAlice)xBob mod p. If everything works correctly, zAlice=zBob, since:

z A l i c e = ( y B o b ) x A l i c e m o d p = ( g x B o b ) x A l i c e m o d p = ( g x A l i c e ) x B o b m o d p = ( y A l i c e ) x B o b m o d p = z B o b .

Thus, Alice and Bob have a shared key z=zAlice=zBob. An attacker who pretends to be Alice but does not know her secret exponent (xAlice) will not be able to compute zAlice=(yBob)xAlice mod p correctly. Alice and Bob can positively identify themselves by showing that they correctly found z. For example, each can compute and send the other the hash of z concatenated with their own certificate. Once Alice and Bob have verified each other, they can use a symmetric key derived from z to secure their communications. (For an example of a protocol in the background art that uses authenticated Diffie-Hellman, see “The SSL Protocol Version 3.0” by A. Freier, P. Karlton, and P. Kocher, March 1996.)

2. Leak-Resistant Certified Diffie-Hellman

A satisfactory leak-resistant public key cryptographic scheme should overcome the problem that, while certification requires the public key be constant, information about the corresponding private key should not leak out of the token that contains it. In the symmetric protocol described above, the design assumes that the leak function reveals no useful information about old deleted values of Kt or about future values of Kt that have not yet been computed. Existing public key schemes, however, require that implementations repeatedly perform a consistent, usually deterministic, operation using the private key. For example, in the case of Diffie-Hellman, a leak-resistant token that is compatible with existing protocols and implementations should be able to perform the secret key operation yx mod p, while ensuring that the exponent x remains secret. The radical reshuffling of the secret provided by the hash function HK in the symmetric approach cannot be used because the device should be able to perform the same operation consistently.

The operations used by the token to perform the private key operation are modified to add leak resistance using the following variables:

Register Comment x1 First part of the secret key (in nonvolatile updateable memory) x2 Second part of the secret key (in nonvolatile updateable memory) g The generator (not secret). p The public prime, preferably a strong prime (not secret).

The prime p and generator g may be global parameters, or may be specific to individual users or groups of users (or tokens). In either case, the certificate recipient should be able to obtain p and g securely, usually as built-in constants or by extracting them from the certificate.

To generate a new secret key, the key generation device (often but not always the cryptographic token that will contain the key) first obtains or generates p and g, where p is the prime and g is a generator mod p. If p and g are not system-wide parameters, algorithms known in the background art for selecting large prime numbers and generators may be used. It is recommended that p be chosen with

p - 1 2
also prime, or at least that φ(p) not be smooth. (When

p - 1 2
is not prime, information about x1 and X2 modulo small factors of φ(p) may be leaked, which is why it is preferable that φ(p) not be smooth. Note that φ denotes Euler's totient function.) Once p and g have been chosen, the device generates two random exponents x1 and X2. The lowest-order bit of x1 and of X2 is not considered secret, and may be set to 1. Using p, g, x1, and x2, the device can then compute its public key as gx1x2 mod p and submit it, along with any required identifying information or parameters needed (e.g., p and g), to the CA for certification.

FIG. 2 illustrates the process followed by the token to perform private key operations. At step 205, the token obtains the input message y, its own (non-secret) prime p, and its own secret key halves (x1 and x2). If x1, x2, and p are stored in encrypted and/or authenticated form, they would be decrypted or verified at this point. At this step, the token should verify that 1<y<p−1. At step 210, the token uses a random number generator (or pseudorandom number generator) to select a random integer b0, where 0<b0<p. At step 215, the token computes b1=b0−1 mod p. The inverse computation mod p may be performed using the extended Euclidean algorithm or the formula b1=b0φ(p)−1 mod p. At step 220, the token computes b2=b1x1 mod p. At this point, b1 is no longer needed; its storage space may be used to store b2. Efficient algorithms for computing modular exponentiation, widely known in the art, may be used to complete step 220. Alternatively, when a fast modular exponentiator is available, the computation b2 may be performed using the relationship b2=b0φ(p)−x1 mod p. At step 225, the token computes b3=b2x2 mod p. At this point, b2 is no longer needed; its storage space may be used to store b3. At step 230, the token computes z0=b0y mod p. At this point, y and b0 are no longer needed; their space may be used to store r1 (computed at step 235) and z0. At step 235, the token uses a random number generator to select a random integer r1, where 0<r1<φ(p) and gcd(r1, φ(p))=1. (If

p - 1 2
is known to be prime, it is sufficient to verify that r1 is odd.) At step 240, the token updates x1 by computing x1←x1r1 mod φ(p). The old value of x1 is deleted and replaced with the updated value. At step 245, the token computes r2=(r1−1) mod φ(p). If

p - 1 2
is prime, then r2 can be found using a modular exponentiator and the Chinese Remainder Theorem. Note that r1 is not needed after this step, so its space may be used to store r2. At step 250, the token updates x2 by computing x2←x2r2 mod φ(p). The old value of x2 should be deleted and replaced with the updated value. At step 255, the token computes z1=(z0)x1 mod p. Note that z0 is not needed after this step, so its space may be used to store z1. At step 260, the token computes z2=(z1)x2 mod p. Note that z1 is not needed after this step, so its space may be used to store z2. At step 265, the token finds the exponential key exchange result by computing z=z2b3 mod p. Finally, at step 270, the token erases and frees any remaining temporary variables.

The process shown in FIG. 2 correctly computes z=yx mod p, where x=x1x2 mod φ(p), since:

z = z 2 b 3 m o d p = ( z 1 x 2 m o d p ) ( b 2 x 2 m o d p ) m o d p = ( ( z 0 x 1 m o d p ) x 2 ) ( ( b 1 x 1 m o d p ) x 2 ) m o d p = ( b 0 y m o d p ) x 1 x 2 ( b 0 - 1 m o d p ) x 1 x 2 m o d p = y x 1 x 2 m o d p = y x m o d p .

The technique is useful for private key owners communicating with other users (or devices) who have certificates, and also when communicating with users who do not.

If Alice has a certificate and wishes to communicate with Bob who does not have a certificate, the protocol proceeds as follows. Alice sends her certificate (CAlice) to Bob, who receives it and verifies that it is acceptable. Bob extracts yAlice (along with pAlice and gAlice, unless they are system-wide parameters) from CAlice. Next, Bob generates a random exponent xBA, where 0<xAB<φ(pAlice). Bob then uses his exponent xAB and Alice's parameters to calculate yBA=(gAlicexBA)mod pAlice and the session key z=(yAlicexBA)mod pAlice. Bob sends yBA to Alice, who performs the operation illustrated in FIG. 2 to update her internal parameters and derive z from yBA. Alice then proves that she computed z correctly, for example by sending Bob H(z∥CAlice). (Alice cannot authenticate Bob because he does not have a certificate. Consequently, she does not necessarily need to verify that he computed z successfully.) Finally, Alice and Bob can use z (or, more commonly, a key derived from z) to secure their communications.

If both Alice and Bob have certificates, the protocol works as follows. First, Alice and Bob exchange certificates (CAlice and CBob), and each verifies that other's certificate is valid. Alice then extracts the parameters pBob, gBob, and yBob from CBob, and Bob extracts pAlice, gAlice, and yAlice from CAlice. Alice then generates a random exponent xAB where 0<xAB<φ(pBob), computes yAB=(gBob)xAB mod pBob, and computes zAB−(yBob)xAB mod pBob. Bob generates a random xBA where 0<xBA<φ(pAlice), computes yBA=(gAlice)xBA mod pAlice, and computes zBA−(yAlice)xBA mod pAlice. Bob sends yBA to Alice, and Alice sends yAB to Bob. Alice and Bob each perform the operation shown in FIG. 2, where each uses the prime p from their own certificate and their own secret exponent halves (x1 and x2). For the message y in FIG. 2, Alice uses yBA (received from Bob), and Bob uses yAB (received from Alice). Using the process shown in FIG. 2, Alice computes z. Using z and zAB (computed previously), she can find a session key K. This may be done, for example, by using a hash function H to compute K=H(z∥zAB). The value of z Bob obtains using the process shown in FIG. 2 should equal Alice's zAB, and Bob's zBA (computed previously) should equal Alice's z. If there were no errors or attacks, Bob should thus be able to find K, e.g., by computing K=H(zBA∥z). Alice and Bob now share K. Alice can prove her identity by showing that she computed K correctly, for example by sending Bob H(K∥CAlice). Bob can prove his identity by sending Alice H(K∥CBob). Alice and Bob can then secure their communications by encrypting and authenticating using K or a key derived from K.

Note that this protocol, like the others, is provided as an example only; many variations and enhancements are possible and will be evident to one skilled in the art. For example, certificates may come from a directory, more than two parties can participate in the key agreement, key escrow functionality may be added, the prime modulus p may be replaced with a composite number, etc. Note also that Alice and Bob as they are called in the protocol are not necessarily people; they would normally be computers, cryptographic devices, etc.

For leak resistance to be effective, attackers should not be able to gain new useful information about the secret variables with each additional operation unless a comparable amount of old useful information is made useless. While the symmetric design is based on the assumption that leaked information will not survive the hash operation HK, this design uses multiplication operations mod φ(p) to update x1 and x2. The most common variety of leaked information, statistical information about exponent bits, is not of use to attackers in this design, as the exponent update process (x1←x1r1 mod φ(p) and x2←x2r2 mod φ(p)) destroys the utility of this information. The only relevant characteristic that survives the update process is that x1x2 mod φ(p) remains constant, so the system designer should be careful to ensure that the leak function does not reveal information allowing the attacker to find new useful information about x1x2 mod φ(p).

There is a modest performance penalty, approximately a factor of four, for the leak-resistant design as described. One way to improve performance is to remove the blinding and unblinding operations, which are often unnecessary. (The blinding operations prevent attackers from correlating input values of y with the numbers processed by the modular exponentiation operation.) Alternatively or additionally, it is possible to update and reuse values of b0, b3, r1, and r2 by computing b0←(b0)v mod p, b3←(b3)v mod p, r1←(r1)w mod φ(p), and r2←(r2)w mod φ(p), where v and w are fairly short random exponents. Note that the relationship b3←b0−x1x2 mod p remains true when b0 and b3 are both raised to the power v (mod p). The relationship r2=(r1−1) mod φ(p) also remains true when r1 and r2 are exponentiated (mod φ(p)). Other parameter update operations may also be used, such as exponentiation with fixed exponents (e.g., v=w=3), or multiplication with random values and their inverses, mod p and φ(p). The time per transaction with this update process is about half that of the unoptimized leak-resistant implementation, but additional storage is required and care should be taken to ensure that b0, b3, r1, and r2 will not be leaked or otherwise compromised.

It should also be noted that with this particular type of certified Diffie-Hellman, the negotiated key is the same every time any given pair of users communicate. Consequently, though the blinding operation performed using b0 and b3 does serve to protect the exponents, the result K can be leaked in the final step or by the system after the process is complete. If storage is available, parties could keep track of the values of y they have received (or their hashes) and reject duplicates. Alternatively, to ensure that a different result is obtained from each negotiation, Alice and Bob can generate and exchange additional exponents, wAlice and wBob, for example with 0<w<2128 (where 2128<<p). Alice sets y=(yBA)wAlicewBob mod p instead of just y=yBA, and Bob sets y=(yAB)wBobwAlice mod p instead of y=yAB before performing the operation shown in FIG. 2.

B. Leak-Resistant RSA

Another asymmetric cryptographic protocol is RSA, which is widely used for digital signatures and public key encryption. RSA private key operations rely on secret exponents. If information about these secret exponents leaks from an implementation, its security can be compromised. Consequently, a leak-resistant implementation of RSA would be useful.

To give RSA private key operations resistance to leaks, it is possible to divide the secret exponent into two halves such that information about either half is destroyed with each operation. These are two kinds of RSA private key operations. The first, private key signing, involves signing a message with one's own private key to produce a digital signature verifiable by anyone with one's corresponding public key. RSA signing operations involve computing S=Md mod n, where M is the message, S is the signature (verifiable using M=Se mod n), d is the secret exponent and equals e−1 mod φ(n), and n is the modulus and equals pq, where n and e are public and p and q are secret primes, and φ is Euler's phi function. An RSA public key consists of e and n, while an RSA private key consists of d and n (or other representations of them). For RSA to be secure, d, φ(n), p, and q should all be secret.

The other RSA operation is decryption, which is used to recover messages encrypted using one's public key. RSA decryption is virtually identical to signing, since the decrypted message M is recovered from the ciphertext C by computing M=Cd mod n, where the ciphertext C was produced by computing C=Me mod n. Although the following discussion uses variable names from the RSA signing operation, the same techniques may be applied similarly to decryption.

An exemplary leak-resistant scheme for RSA implementations may be constructed as illustrated in FIG. 3. At step 300, prior to the commencement of any signing or decryption operations, the device is initialized with (or creates) the public and private keys. The device contains the public modulus n and the secret key components d1, d2, and z, and k, where k is a prime number of medium-size (e.g., 0<k<2128) chosen at random, z=kφ(n), d1 is a random number such that 0<d1<z and gcd(d1, z)=1, and d2=(e−1 mod φ(n))(d1−1 mod z) mod z. In this application, d1 and d2 replace the usual RSA secret exponent d. Techniques for generating the initial RSA primes (e.g., p and q) and modulus (n) are well known in the background art. At step 305, the device computes a random prime k′ of medium size (e.g., 0<k′<2128). (Algorithms for efficiently generating prime numbers are known in the art.)

At step 303, the device (token) receives a message M to sign (or to decrypt). At step 310, the device updates z by computing z←k′z. At step 315, the device updates z again by computing z←z/k. (There should be no remainder from this operation, since k divides z.) At step 320, k is replaced with k′ by performing k←k′. Because k′ will not be used in subsequent operations, its storage space may be used to hold R (produced at step 325). At step 325, the device selects a random R where 0<R<z and gcd(R, z)=1. At step 330, the device updates d1 by computing d1←d1R mod z. At step 335, the device finds the inverse of R by computing R′←R−1 mod z using, for example, the extended Euclidean algorithm. Note that R is no longer needed after this step, so its storage space may be erased and used to hold R′. At step 340, the device updates d2 by computing d2←d2R′ mod z. At step 345, the device computes S0=Md1 mod n, where M is the input message to be signed (or the message to be decrypted). Note that M is no longer needed after this step, so its storage space may be used for S0. At step 350, the device computes S=S0d2 mod n, yielding the final signature (or plaintext if decrypting a message). Leak-resistant RSA has similar security characteristics as normal RSA; standard message padding, post-processing, and key sizes may be used. Public key operations are also performed normally (e.g., M=Se mod n).

A simpler RSA leak resistance scheme may be implemented by splitting the exponent d into two halves d1 and d2 such that d1+d2=d. This can be achieved during key generation by choosing d1 to be a random integer where 0≦d1≦d, and choosing d2←d−d1. To perform private key operations, the device needs d1 and d2, but it does not need to contain d. Prior to each private key operation, the cryptographic device identifies which of d1 and d2 is larger. If d1>d2, then the device computes a random integer r where 0≦r≦d1, adds r to d2 (i.e., d2←d2+r), and subtracts r from d1 (i.e., d1←d1−r). Otherwise, if d1≦d2, then the device chooses a random integer r where 0≦r ≦d2, adds r to d1 (i.e., d1←d1+r), and subtracts r from d2 (i.e., d2←d2−r). Then, to perform the private key operation on a message M, the device computes s1=Md1 mod n, s2=Md2 mod n, and computes the signature S=s1s2 mod n. While this approach of splitting the exponent into two halves whose sum equals the exponent can also be used with Diffie-Hellman and other cryptosystems, dividing the exponent into the product of two numbers mod φ(p) is usually preferable since the assumption that information about d1+d2 will not leak is less conservative than the assumption that information about x1x2 mod φ(p) will not leak. In the case of RSA, updates mod φ(n) cannot be done safely, since φ(n) must be kept secret.

When the Chinese Remainder Theorem is required for performance, it is possible to use similar techniques to add leak resistance by maintaining multiples of the secret primes (p and q) that are updated every time (e.g., multiplying by the new multiple then dividing by the old multiple). These techniques also protect the exponents (dp and dq) as multiples of their normal values. At the end of the operation, the result S is corrected to compensate for the adjustments to dp, dq, p, and q.

An exemplary embodiment maintains state information consisting of the values n, Bi, Bf, k, pk, qk, dpk, dqk, pInv, and f. To convert a traditional RSA CRT private key (consisting of p, q, dp, and dq with p<q) into the new representation, a random value for k is chosen, where 0<k<264. The value Bi is chosen at random where 0<Bi<n, and R1 and R2 are chosen at random where 0<R1<264 and 0<R2<264. (Of course, constants such as 264 are chosen as example values. It is possible, but not necessary, to place constraints on random numbers, such as requiring that they be prime.) The leak-resistant private key state is then initialized by setting n←pq, Bƒ←Bi−d mod n, pk←(k)(p), qk←(k)(q), dpk←dp+(R1)(p)−R1, dqk←dq+(R2)(q)−R2, pInv←k(p−1 mod q), and ƒ←0.

To update the system state, first a random value a may be produced where 0<α<264. Then compute pk←((α)(pk))/k, qk←((α)(qk))/k, pInv←((α)(pInv))/k, k←α. The exponents dpk and dqk may be updated by computing dpk←dpk±(R3pk−R3k) and dqk←dqk±(R4qk−R4k), where R3 and R4 can be random or constant values (even 1). The blinding factors Bi and Bƒ may be updated by computing Bi=Bi2 mod n and Bƒ=Bƒ2 mod n, by computing new blinding factors, by exponentiating with a value other than 2, etc. Update processes should be performed as often as practical, for example before or after each modular exponentiation process. Before the update begins, a failure counter ƒ is incremented, and when the update completes ƒ is set to zero. If ƒ ever exceeds a threshold value indicating too many consecutive failures, the device should temporarily or permanently disable itself. Note that if the update process is interrupted, memory values should not be left in intermediate states. This can be done by using complete reliable memory updates. If the total set of variable changes is too large for a single complete update, it is possible to store α first then do each variable update reliably which keeping track of how many have been completed.

To perform a private key operation (such as decryption or signing), the input message C is received by the modular exponentiator. Next, the value is blinded by computing C′←(C)(Bi) mod n. The blinded input message is then used to compute modified CRT intermediates by computing mpk←(C′)dpk mod pk and mqk←(C′)dqk mod qk. Next in the exemplary embodiment, the CRT intermediates are multiplied by k, e.g. mpk←(k)(mpk) mod pk and mqk←(k)(mqk) mod qk. The CRT difference is then computed as mpqk=(mpk[+qk]−mqk) [mod qk], where the addition of qk and/or reduction mod qk are optional. (The addition of qk ensures that the result is non-negative.) The blinded result can be computed as

M = ( m p k ) k + p k [ ( ( p I n v ) ( m p q k ) k ) m o d q k ] k 2 ,
then the final result M is computed as M=(M′)Bƒ mod n.

As one of ordinary skill in the art will appreciate, variant forms of the techniques disclosed herein are possible. For example, the computational processes can be re-ordered or modified without significantly changing the general principles of operation. Some portions (such as the initial and blinding steps) can be skipped. In another example, it is also possible to use multiple blinding factors (for example, instead of or in addition to the value k).

In some cases, other techniques may also be appropriate. For example, exponent vector codings may be rechosen frequently using, for example, a random number generator. Also, Montgomery arithmetic may be performed mod j where j is a value that is changed with each operation (as opposed to traditional Montgomery implementations where j is constant with j=2k). The foregoing shows that the methods and apparatuses can be implemented using numerous variations and modifications to the exemplary embodiments described herein, as would be known by one skilled in the art.

C. Leak-Resistant ElGamal Public Key Encryption and Digital Signatures

Still other asymmetric cryptographic protocols that may be improved using the techniques disclosed. For example, ElGamal and related cryptosystems are widely used for digital signatures and public key encryption. If information about the secret exponents and parameters leaks from an ElGamal implementation, security can be compromised. Consequently, leak-resistant implementations of ElGamal would be useful.

The private key in the ElGamal public key encryption scheme is a randomly selected secret a where 1≦a≦p−2. The non-secret parameters are a prime p, a generator α, and αa mod p. To encrypt a message m, one selects a random k (where 1≦k≦p−2) and computes the ciphertext (γ, δ) where γ=αk mod p and δ=m(αa mod p)k mod p. Decryption is performed by computing m=δ(γp−1−a) mod p. (See the Handbook of Applied Cryptography by A. Menezes, P. van Oorschot, and S. Vanstone, 1997, pages 294-298, for a description of ElGamal public-key encryption).

To make the ElGamal public-key decryption process leak-resistant, the secret exponent (p−1−a) is stored in two halves a1 and a2, such that a1a2=(φ(p)−a) mod φ(p). When generating ElGamal parameters for this leak-resistant implementation, it is recommended, but not required, that p be chosen with

p - 1 2
prime so that φ(p)/2 is prime. The variables a1 and a2 are normally chosen initially as random integers between 0 and φ(p). Alternatively, it is possible to generate a first, then choose a1 and a2, as by selecting a1 relatively prime to φ(p) and computing a2=(a−1 mod φ(p))(a1−1 mod φ(p)) mod φ(p).

FIG. 4 illustrates an exemplary leak-resistant ElGamal decryption process. At step 405, the decryption device receives an encrypted message pair (γ, δ). At step 410, the device selects a random r1 where 1≦r1<φ(p) and gcd(r1, φ(p))=1. At step 415, the device updates a1 by computing a1←a1r1 mod φ(p), over-writing the old value of a1 with the new value. At step 420, the device computes the inverse of r1 by computing r2=(r1)−1 mod φ(p). Because r1 is not used after this step, its storage space may be used to hold r2. Note that if

p - 1 2
is prime, then r2 may also be found by finding

r 2 = r 1 ( p - 1 ) / 2 - 2 m o d p - 1 2 ,
and using the CRT to find r2 (mod p−1). At step 425, the device updates a2 by computing a2←a2r2 mod φ(p). At step 430, the device begins the private key (decryption) process by computing m′=γa1 mod p. At step 435, the device computes m=δ(m′)a2 mod p and returns the message m. If verification is successful, the result equals the original message because:

( δ ) ( m ) a 2 m o d p = ( m ( α a ) k ) ( γ a 1 m o d p ) a 2 m o d p = ( m α a k ) ( γ a 1 a 2 m o d ϕ ( p ) ) m o d p = ( m α a k ) ( ( α k m o d p ) - a m o d ϕ ( p ) ) m o d p = ( m α a k ) ( α - a k ) m o d p = m

As with the ElGamal public key encryption scheme, the private key for the ElGamal digital signature scheme is a randomly-selected secret a, where 1≦a≦p−2. The public key is also similar, consisting of a prime p, a generator α, and public parameter y where y=αa mod p. To sign a message m, the private key holder chooses or precomputes a random secret integer k (where 1≦k≦p−2 and k is relatively prime to p−1) and its inverse, k−1 mod φ(p). Next, the signer computes the signature (r, s), where r=αk mod p,

s=((k−1 mod φ(p))[H(m)−ar])mod φ(p),and H(m) is the hash of the message. Signature verification is performed using the public key (p, α, y) by verifying that 1≦r<p and by verifying that yrrs mod p=αH(m) mod p.

To make the ElGamal digital signing process leak-resistant, the token containing the private key maintains three persistent variables, ak, w, and r. Initially, ak=a (the private exponent), w=1, and r=α. When a message m is to be signed (or during the precomputation before signing), the token generates a random number b and its inverse b−1 mod φ(p), where b is relatively prime to φ(p) and 0<b<φ(p). The token then updates ak, w, and r by computing ak←(ak)(b−1) mod φ(p), w←(w)(b−1) mod φ(p), and r←(rb) mod p. The signature (r, s) is formed from the updated value of r and s, where s=(w(H(m)−akr))mod φ(p). Note that ak, w, and r are not randomized prior to the first operation, but should be randomized before exposure to possible attack, since otherwise the first operation may leak more information than subsequent ones. It is thus recommended that a dummy signature or parameter update with ak←(ak)(b−1) mod φ(p), w←(w)(b−1) mod φ(p), and r←(rb) mod p be performed immediately after key generation. Valid signatures produced using the exemplary tamper-resistant ElGamal process may be checked using the normal ElGamal signature verification procedure.

It is also possible to split all or some the ElGamal variables into two halves as part of the leak resistance scheme. In such a variant, a is replaced with a1 and a2, w with w1 and w2, and r with r1 and r2. It is also possible to reorder the operations by performing, for example, the parameter updates as a precomputation step prior to receipt of the enciphered message. Other variations and modifications to the exemplary embodiments described herein will be evident to one skilled in the art.

D. Leak-Resistant DSA

Another commonly used asymmetric cryptographic protocol is the Digital Signature Algorithm (DSA, also known as the Digital Signature Standard, or DSS), which is defined in “Digital Signature Standard (DSS),” Federal Information Processing Standards Publication 186, National Institute of Standards and Technology, May 19, 1994 and described in detail in the Handbook of Applied Cryptography, pages 452 to 454. DSA is widely used for digital signatures. If information about the secret key leaks from a DSA implementation, security can be compromised. Consequently, leak-resistant implementations of DSA would be useful.

In non-leak-proof systems, the private key consists of a secret parameter a, and the public key consists of (p, q, α, y), where p is a large (usually 512 to 1024 bit) prime, q is a 160-bit prime, α is a generator of the cyclic group of order q mod p, and y=αa mod p. To sign a message whose hash is H(m), the signer first generates (or precomputes) a random integer k and its inverse k−1 mod q, where 0<k<q. The signer then computes the signature (r, s), where r=(αk mod p) mod q, and s=(k−1 mod q)(H(m)+ar) mod q.

In an exemplary embodiment of a leak-resistant DSA signing process, the token containing the private key maintains two variables in nonvolatile memory, ak and k, which are initialized with ak=a and k=1. When a message m is to be signed (or during the precomputation before signing), the token generates a random integer b and its inverse b−1 mod q, where 0<b<q. The token then updates ak and k by computing ak←(akb−1 mod q)(k) mod q, followed by k←b. The signature (r, s) is formed from the updated values of ak and k by computing r=αk mod p (which may be reduced mod q), and s=[(b−1H(m) mod q)+(akr) mod q] mod q. As indicated, when computing s, b−1H(m) mod q and (akr) mod q are computed first, then combined mod q. Note that ak and k should be randomized prior to the first operation, since the first update may leak more information than subsequent updates. It is thus recommended that a dummy signature (or parameter update) be performed immediately after key generation. Valid signatures produced using the leak-resistant DSA process may be checked using the normal DSA signature verification procedure.

IV. Other Algorithms and Applications

Still other cryptographic processes can be made leak-proof or leak-resistant, or may be incorporated into leak-resistant cryptosystems. For example, cryptosystems such as those based on elliptic curves (including elliptic curve analogs of other cryptosystems), secret sharing schemes, anonymous electronic cash protocols, threshold signatures schemes, etc. be made leak resistant using the techniques disclosed.

Implementation details of the schemes described may be adjusted without materially changing the fundamental concepts of operation, for example by re-ordering operations, inserting steps, substituting equivalent or similar operations, etc. Also, while new keys are normally generated when a new system is produced, it is often possible to add leak resistance retroactively while maintaining or converting existing private keys.

Leak-resistant designs avoid performing repeated mathematical operations using non-changing (static) secret values, since they are likely to leak out. However, in environments where it is possible to implement a simple function (such as an exclusive OR) that does not leak information, it is possible use this function to implement more complex cryptographic operations.

While the exemplary implementations assume that the leak functions can reveal any information present in the system, designers may often safely use the (weaker) assumption that information not used in a given operation will not be leaked by that operation. Schemes using this weaker assumption may contain a large table of precomputed subkey values, from which a unique or random subset are selected and/or updated for each operation. For example, DES implementations may use indexed permutation lookup tables in which a few table elements are exchanged with each operation.

While leak resistance provides many advantages, the use of leak resistance by itself cannot guarantee good security. For example, leak-resistant cryptosystems are not inherently secure against error attacks, so operations should be verified. (Changes can even be made to the cryptosystem and/or leak resistance operations to detect errors.) Similarly, leak resistance by itself does not prevent attacks that extract the entire state out of a device (e.g., L=LMAX). For example, traditional tamper resistance techniques may be required to prevent attackers from staining ROM or EEPROM memory cells and reading the contents under a microscope. Implementers should also be aware of interruption attacks, such as those that involve disconnecting the power or resetting a device during an operation, to ensure that secrets will not be compromised or that a single leaky operation will not be performed repeatedly. (As a countermeasure, devices can increment a counter in nonvolatile memory prior to each operation, and reset or reduce the counter value when the operation completes successfully. If the number of interrupted operations since the last successful update exceeds a threshold value, the device can disable itself.) Other tamper resistance mechanisms and techniques, such as the use of fixed-time and fixed-execution path code or implementations for critical operations, may need to be used in conjunction with leak resistance, particularly for systems with a relatively low self-healing rate (e.g., LMAX is small).

Leak-resistant algorithms, protocols, and devices may be used in virtually any application requiring cryptographic security and secure key management, including without limitation: smartcards, electronic cash, electronic payments, funds transfer, remote access, timestamping, certification, certificate validation, secure e-mail, secure facsimile, telecommunications security (voice and data), computer networks, radio and satellite communications, infrared communications, access control, door locks, wireless keys, biometric devices, automobile ignition locks, copy protection devices, payment systems, systems for controlling the use and payment of copyrighted information, and point of sale terminals.

The foregoing shows that the general principles of operation as disclosed herein can be implemented using numerous variations and modifications to the exemplary embodiments described herein, as would be known by one skilled in the art. Thus, it is intended that the scope of the invention(s) be limited only with regard to the claims below.

Claims

1. A method for performing a plurality of secure payment transactions using a smartcard, where said smartcard and a verifier of said payment transaction share an initial secret starting key value, comprising:

(a) initializing said smartcard, where said initializing includes: (i) storing said starting key value in a nonvolatile key storage memory location; and (ii) storing an initial value in a nonvolatile transaction counter memory location;
(b) for each of a plurality of payment transactions: (i) computing an updated key value: (x) by cryptographically transforming at least said stored key value and said transaction counter; (y) where said transforming at least obscures partial information about said stored key, thereby deterring attacks that combine partial information leaked in said plurality of transactions; (ii) updating said nonvolatile memory locations including: (x) updating said key storage location with said updated key value; and (y) incrementing said value of said transaction counter location; (iii) using said updated key value to compute a message authentication code authenticating said transaction; and (iv) sending said computed message authentication code and said transaction counter to a third party for use in verifying said payment transaction.

2. The method of claim 1 where:

(1) after step (a) and prior to one of said payment transactions in step (b), said smartcard receives an authentication code and a parameter from said third party, and verifies said authentication code; and
(2) said step (b)(i) includes performing one or more cryptographic key update operations based on said received parameter.

3. A computer readable memory containing a program for performing a plurality of secure payment transactions between a tamper-resistant device and a verifier that share an initial secret starting key value, comprising:

(a) logic instructions for computing an updated key value for a subsequent transaction: (i) by cryptographically transforming at least a key value and a transaction counter value stored in nonvolatile memory locations in said tamper-resistant device; (ii) where said transforming at least obscures partial information about said stored key, thereby deterring attacks that combine partial information leaked in said plurality of transactions;
(b) logic instructions for updating said nonvolatile memory locations including: (i) replacing said key value with said updated key value; and (ii) incrementing said transaction counter value;
(c) logic instructions for using said updated key value to compute a message authentication code authenticating said transaction; and
(d) logic instructions for sending said computed message authentication code and said transaction counter to a third party for use in verifying said payment transaction.

4. The computer readable memory of claim 3 further comprising:

(1) logic instructions for receiving an authentication code and an updated value of said transaction counter from said third party, and verifying said authentication code; wherein
(2) said (b)(i) includes logic instructions for performing one or more cryptographic key update operations based on said received transaction counter.

5. A smartcard for performing a secure payment transaction, comprising:

(a) a microprocessor;
(b) a nonvolatile memory area initially configured to store a secret parameter;
(c) a nonvolatile memory area initially configured to store an indexing indicia;
(d) a memory storing logic instructions capable of being executed using said processor to: (i) compute an updated secret parameter for a subsequent transaction by cryptographically transforming at least said stored secret parameter and said indexing indicia, where said transforming at least obscures partial information about said stored secret parameter; (ii) replace said stored secret parameter with said updated value thereof; (iii) compute a value authenticating transaction information by cryptographically transforming at least said updated secret parameter and said transaction information; and
(e) an output interface configured to transmit representations of said value and said indexing indicia to a payment transaction verifier.

6. The smartcard of claim 5 wherein:

(1) said memory further stores logic instructions capable of being executed using said processor to receive an authentication code and an updated value of said indexing indicia from said payment transaction verifier for use m said (d)(i), and verifies said authentication code; and
(2) said (d)(i) includes logic instructions for performing one or more secret parameter update operations based on said received indexing indicia.
Referenced Cited
U.S. Patent Documents
1657411 January 1928 Scherbius
2632058 March 1953 Gray
2733432 January 1956 Breckman
3816762 June 1974 Holt, Jr.
4107458 August 15, 1978 Constant
4139839 February 13, 1979 Fletcher et al.
4200770 April 29, 1980 Hellman et al.
4202051 May 1980 Davida et al.
4203166 May 1980 Ehrsam et al.
4211919 July 8, 1980 Ugon
4214126 July 22, 1980 Wipff
4225962 September 30, 1980 Meyr et al.
4243890 January 6, 1981 Miller et al.
4268898 May 19, 1981 Brown
4295041 October 13, 1981 Ugon
4309569 January 5, 1982 Merkle
4369332 January 18, 1983 Campbell, Jr.
4405829 September 20, 1983 Rivest et al.
4563546 January 7, 1986 Glitz
4569052 February 4, 1986 Cohn et al.
4570084 February 11, 1986 Griffin et al.
4605820 August 12, 1986 Campbell, Jr.
4605921 August 12, 1986 Riddle et al.
4622480 November 11, 1986 Uchimura et al.
4661658 April 28, 1987 Matyas
4669117 May 26, 1987 Van Eck
4680688 July 14, 1987 Inou et al.
4686392 August 11, 1987 Lo
4759063 July 19, 1988 Chaum
4776011 October 4, 1988 Busby
4799258 January 17, 1989 Davies
4813024 March 14, 1989 Lisimaque et al.
4905176 February 27, 1990 Schulz
4908038 March 13, 1990 Matsumura et al.
4916333 April 10, 1990 Kowalski
4932053 June 5, 1990 Fruhauf et al.
4932057 June 5, 1990 Kolbert
4937649 June 26, 1990 Shiba et al.
4937866 June 26, 1990 Crowther et al.
5017766 May 21, 1991 Tamada et al.
5068894 November 26, 1991 Hoppe
5086467 February 4, 1992 Malek
5136643 August 4, 1992 Fischer
5136646 August 4, 1992 Haber et al.
5144667 September 1, 1992 Pogue et al.
5149992 September 22, 1992 Allstot et al.
5157725 October 20, 1992 Lindholm
5159632 October 27, 1992 Crandall
5165098 November 17, 1992 Hoivik
5177430 January 5, 1993 Mohel
5181243 January 19, 1993 Saltwick et al.
5216713 June 1, 1993 Lindholm
5241598 August 31, 1993 Raith
5243648 September 7, 1993 Gilardi et al.
5249294 September 28, 1993 Griffin, III et al.
5293029 March 8, 1994 Iijima
5297201 March 22, 1994 Dunlavy
5297207 March 22, 1994 Degele
5341423 August 23, 1994 Nossen
5355413 October 11, 1994 Ohno
5369706 November 29, 1994 Latka
5399996 March 21, 1995 Yates et al.
5401950 March 28, 1995 Yoshida
5402402 March 28, 1995 Kagami et al.
5404402 April 4, 1995 Sprunk
5412379 May 2, 1995 Waraksa et al.
5412723 May 2, 1995 Canetti et al.
5412730 May 2, 1995 Jones
5414614 May 9, 1995 Fette et al.
5420925 May 30, 1995 Michaels
5428684 June 27, 1995 Akiyama et al.
5434919 July 18, 1995 Chaum
5444288 August 22, 1995 Jacobs
5477039 December 19, 1995 Lisimaque et al.
5481555 January 2, 1996 Wade et al.
5483182 January 9, 1996 Rybicki
5483598 January 9, 1996 Kaufman et al.
5495098 February 27, 1996 Pailles et al.
5506905 April 9, 1996 Markowski et al.
5511123 April 23, 1996 Adams
5514982 May 7, 1996 Hall et al.
5515438 May 7, 1996 Bennett et al.
5539825 July 23, 1996 Akiyama et al.
5539827 July 23, 1996 Liu
5544086 August 6, 1996 Davis et al.
5546463 August 13, 1996 Caputo et al.
5551013 August 27, 1996 Beausoleil et al.
5552776 September 3, 1996 Wade et al.
5557346 September 17, 1996 Lipner et al.
5559887 September 24, 1996 Davis et al.
5559890 September 24, 1996 Obermeier et al.
5572112 November 5, 1996 Saeki et al.
5600273 February 4, 1997 Hall et al.
5600324 February 4, 1997 Reed et al.
5602917 February 11, 1997 Mueller
5608614 March 4, 1997 Ohnishi et al.
5623548 April 22, 1997 Akiyama et al.
5625692 April 29, 1997 Herzberg et al.
5625695 April 29, 1997 M'Hraihi et al.
5631492 May 20, 1997 Ramus et al.
5633930 May 27, 1997 Davis et al.
5636157 June 3, 1997 Hesson et al.
5638444 June 10, 1997 Chou et al.
5663896 September 2, 1997 Aucsmith
5664017 September 2, 1997 Gressel et al.
5668877 September 16, 1997 Aziz
5670934 September 23, 1997 Ina et al.
5696827 December 9, 1997 Brands
5703413 December 30, 1997 Treharne
5710834 January 20, 1998 Rhoads
5727062 March 10, 1998 Ritter
5727063 March 10, 1998 Aiello et al.
5733047 March 31, 1998 Furuta et al.
5737419 April 7, 1998 Ganesan
5745577 April 28, 1998 Leech
5761306 June 2, 1998 Lewis
5764766 June 9, 1998 Spratte
5778065 July 7, 1998 Hauser et al.
5778069 July 7, 1998 Thomlinson et al.
5778074 July 7, 1998 Garcken et al.
5796836 August 18, 1998 Markham
5812669 September 22, 1998 Jenkins et al.
5821775 October 13, 1998 Mehta et al.
5835599 November 10, 1998 Buer
5838795 November 17, 1998 Mittenthal
5848159 December 8, 1998 Collins et al.
5859548 January 12, 1999 Kong
5870478 February 9, 1999 Kawamura
5892829 April 6, 1999 Aiello et al.
5905399 May 18, 1999 Bosnyak et al.
5907832 May 25, 1999 Pieterse et al.
5914471 June 22, 1999 Van De Pavert
5917168 June 29, 1999 Nakamura et al.
5917754 June 29, 1999 Pathak et al.
5944833 August 31, 1999 Ugon
5946397 August 31, 1999 M'Raihi et al.
5982900 November 9, 1999 Ebihara et al.
5991415 November 23, 1999 Shamir
5994917 November 30, 1999 Wuidart
5995624 November 30, 1999 Fielder et al.
5995629 November 30, 1999 Reiner
5998978 December 7, 1999 Connell et al.
6018717 January 25, 2000 Lee et al.
6028454 February 22, 2000 Elmasry et al.
6031912 February 29, 2000 Moulart et al.
6041122 March 21, 2000 Graunke et al.
6041412 March 21, 2000 Timson et al.
6046608 April 4, 2000 Theogarajan
6047068 April 4, 2000 Rhelimi et al.
6049613 April 11, 2000 Jakobsson
6064724 May 16, 2000 Kelly
6064740 May 16, 2000 Curiger et al.
6066965 May 23, 2000 Blomgren et al.
6069497 May 30, 2000 Blomgren et al.
6069954 May 30, 2000 Moreau
6070795 June 6, 2000 Feiken
6078663 June 20, 2000 Yamamoto
6090153 July 18, 2000 Chen et al.
6107835 August 22, 2000 Blomgren et al.
6115601 September 5, 2000 Ferreira
6128391 October 3, 2000 Denno et al.
6181596 January 30, 2001 Horne et al.
6185596 February 6, 2001 Hadad et al.
6211456 April 3, 2001 Seningen et al.
6236981 May 22, 2001 Hill
6247129 June 12, 2001 Keathley et al.
6278783 August 21, 2001 Kocher et al.
6289455 September 11, 2001 Kocher et al.
6298442 October 2, 2001 Kocher et al.
6304658 October 16, 2001 Kocher et al.
6327661 December 4, 2001 Kocher et al.
6336188 January 1, 2002 Blake-Wilson et al.
6345359 February 5, 2002 Bianco
6381699 April 30, 2002 Kocher et al.
6393567 May 21, 2002 Colnot
6434238 August 13, 2002 Chaum et al.
6442525 August 27, 2002 Silverbrook et al.
6510518 January 21, 2003 Jaffe et al.
6539092 March 25, 2003 Kocher
6654884 November 25, 2003 Jaffe et al.
6698662 March 2, 2004 Feyt et al.
6748410 June 8, 2004 Gressel et al.
7073072 July 4, 2006 Salle
20010016908 August 23, 2001 Blake-Wilson et al.
20010053220 December 20, 2001 Kocher et al.
20020124178 September 5, 2002 Kocher et al.
20030188158 October 2, 2003 Kocher
20060045264 March 2, 2006 Kocher et al.
20080022146 January 24, 2008 Kocher et al.
Foreign Patent Documents
195 11 298 March 1995 DE
0 240 328 October 1987 EP
0304733 March 1989 EP
90201136.0 November 1990 EP
0 452 031 October 1991 EP
0 529 261 March 1993 EP
0 563 912 October 1993 EP
0 424 415 February 1994 EP
0 582 395 February 1994 EP
0 656 708 June 1995 EP
0 660 562 June 1995 EP
0826169 September 1997 EP
1064752 September 1999 EP
1204948 February 2001 EP
0 826 169 November 2002 EP
1 080 400 November 2002 EP
1 062 633 December 2003 EP
2738970 March 1997 FR
2738971 March 1997 FR
60-146361 August 1985 JP
62-082702 April 1987 JP
62-166489 July 1987 JP
62-260406 November 1987 JP
64-081087 March 1989 JP
02-187888 July 1990 JP
05-094458 April 1993 JP
09-163469 June 1997 JP
09-163469 June 1997 JP
10-084223 March 1998 JP
10-171717 June 1998 JP
10-197610 July 1998 JP
WO 97/13342 April 1997 WO
WO 97/14085 April 1997 WO
WO 97/14086 April 1997 WO
WO 97/33217 September 1997 WO
WO 98/52319 November 1998 WO
WO 99/08411 February 1999 WO
WO 99/49416 September 1999 WO
WO 99/63419 December 1999 WO
Other references
  • Oguro et al., JP 09-163469 A, “Device and Method for Remote Control,” Jun. 20, 1997, Japan Office, Computer Translation into English. Retrieved from the Internet:<URL: http://www.ipdl.jpo.go.jp/homepge.ipdl>.
  • RSA Data Security, RSAREF Cryptographic Toolkit Source Code, File RRandom.C, available from ftp://ftp.rsa.com.
  • “Security Requirements for Cryptographic Modules,” Federal Information Processing Standards Publication (FIPS PUB) 140-1, U.S. Department of Commerce, National Institute of Standards and Technology, Jan. 1994.
  • M. Bellare et al., “Incremental Cryptography: The Case of Hashing and Signing” in: Desmedt, Y., Advances in Cryptology-Crypto 94 Proceedings (Berlin, Springer, 1994) pp. 216-233.
  • Paul C. Kocher, “Timing Attacks on Implementation of Diffe-Hellman, RSA, DSS, and Other Systems,” in: Koblitz, N., Advances in Cryptography—Crypto '96 (Berlin, Springer, 1996), pp. 104-113.
  • H. Krawczyk et al., “HMAC: Keyed-Hashing for Message Authentication,” Network Working Group Request for Comments RFC 2104, Feb. 1997.
  • Alfred J. Menezes et al., “Handbook of Applied Cryptography” (CRC Press, 1996), pages including 285-298, 312-319, 452-462, 475, 515-524.
  • J. Ryan, “Blinds for Thermodynamic Cipher Attacks,” unpublished material on the World Wide Web at http://www.cybertrace.com/thrmatak.html, Mar. 1996.
  • Bruce Schneier, “Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,” Oct. 18, 1995. pp. 34-41 and 480-481.
  • Bank Technology News, “Cries of Wolf Over Smart Card Security?” Faulkner & Gray, Inc. Nov. 1, 1996.
  • “Data Encryption Standard,” Federal Information Processing Standards Publication (FIPS PUB) 46-2, U.S. Department of Commerce, National Institute of Standards and Technology, Dec. 30, 1993.
  • Biham, et al., “Differential Fault Analysis of Secret Key Cryptosystems,” in: Kaliski, B., Advances in Cryptology-CRYPTO '97 (Berlin, Springer, 1997), 17th Annual Intl. Cryptology Comference, Aug. 17-21, 1997.
  • Based on “Karn/Hoey/Outerbridge” implementations (KHODES): “File DESC.C from RSAREF—Data Encryption Standard Routines for RSAREF.”
  • American National Standards for Financial Services, secretariat—American Bankers Association (ANS/ABA x9.24-1997), “Financial Services Key Management,” approved Apr. 6, 1992, American National Standards Institute; pp. 1-71.
  • Jueneman, Robert R., “Analysis of Certain Aspects of Output Feedback Mode,” Satellite Business Systems, 1998; pp. 99-127.
  • Bauer, Friedrich L., “Cryptology—Methods and Maxims,” Technical University Munich, 1998; pp. 31-48.
  • Connor, Doug (Technical Editor), “Cryptographic Techniques—Secure Your Wireless Designs,” Jan. 18, 1996; pp. 57-68.
  • Hornauer, et al., “Markov Ciphers and Alternating Groups,” Eurocrypt 91, 1991; pp. 453-460.
  • Koblitz, “A Course in Number Theory and Cryptography” 2e, 1994, Chapter III, pp. 54-77.
  • Lai et al., “Markov Ciphers and Differential Cryptanalysis,” Eurocrypt 91, 1991, pp. 17-38.
  • Hachez et. al., “Timing Attack: What Can Be Achieved By A Powerful Adversary?” 1999.
  • Kocher, Paul C., “Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks,” Report Dec. 7, 1995, pp. 1-6.
  • Kaliski, Burt, “Timing Attacks on Cryptosystem,” RSA Laboraories, Bulletin, No. 2, Jan. 23, 1996.
  • Lacy, J. et al., “CryptoLib Version 1.1”, File Bigpow.c from CryptoLib, United States, Nov. 1999.
  • “File NN.C from RSAFEF”, RSA Laboratories, a division of RSA Data Security, Inc., United States, 1991.
  • Wayner, P., “Code Breaker Crack Smart Cards, Digital Safe”, New York Times, United States, Jun. 22, 1998, on the World Wide Web at: http://www.nytimes.com/library/tech/98/06/biztech/articles/22card/html.
  • Kocher, P., “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems”, Aug. 18, 1996 XP000626590.
  • Back, Adam, “Non-Interactive Forward Secrecy” Sep. 6, 1996.
  • Bell, Jim, “Spread-Spectrum Computer Clock?” Google Beta Groups.
  • Bellare et al., “Optimal Asymmetric Encryption”, Advanced Networking Laboratories, 1998, pp. 92-111, Springer-Verlag, U.S.A.
  • Bellare et al, “The Exact Security of Digital Signatures—How to Sign with RSA and Rabin”, Advances in Cryptology—Eurocrypt 96 Proceedings, Lecture Notes in Computer Science, vol. 1070, , pp. 1-16, U. Maurer ed., Springer-Verlag, 1996.
  • Bellare et al, “Forward Integrity For Secure Audit Logs”, pp. 1-16, Nov. 23, 1997, U.S.A.
  • Frankel et al., “Optimal-Resilience Proactive Public-Key Cryptosystems” IEEE Symposium on Foundations of Computer Science, 1997.
  • Frankel et al., “Proactive RSA”, Lecture Notes in Computer Science, 1996.
  • Herzberg et al, “Proactive Public Key and Signature Systems”, ACM Conference on Computer and Communications Security, 1996.
  • Menzes et al, “Pseudorandom Bits and Sequences”, Handbook of Applied Cryptography, CRC Press, Chapter 5, pp. 169-190, 1996.
  • Menzes et al, “Efficient Implementation”, Handbook of Applied Cryptography, CRC Press, Chapter 14, pp. 591-634, 1996.
  • Rivest, Ronald, “Timing Cryptanalysis of RSA, DH, DDS” Google Beta Groups.
  • Posting on sci.crypt newsgroup, Rivest, Ron, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 11, 1995, retrieved from internet Nov. 19, 2005, http://groups.google,com/group/sci.crypt/msg/79e75dc930adf?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Kocher, Paul C, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 11, 1995, retrieved from internet Nov. 19, 2005, http://groups.google,com/group/sci.crypt/msg/027dadba758893a5?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Walters, Jim, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 11, 1995, retrieved from internet Nov. 19, 2005, http://groups.google,com/group/sci.crypt/msg/77b761989c18baea?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Kocher, Paul C, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 12, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/769112d9a7a17488?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Rubin, Paul, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 12, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/7c8fva520b1b5482?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Brown, Ralf, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 12, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/417b42c49fe7cf53?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Stewart, Bill, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 13, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/7610aea60249ed48?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Larry, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 15, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/ced8289a35a32925?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup,Costa, Bob, “Re: Attacking machines on the Internet (re: Timing cryptanalysis of RSA, DH, DSS)”, Dec. 16, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/350820497cce62ba?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Perry, Tom, “Announce: Timing cryptanalysis of RSA, DH, DSS”, Dec. 17, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/20e43912653f9bd0?dmode=source&hl=en.
  • Posting on sci.crypt newsgroup, Bell, Jim, “Spread-Spectrum computer clock?”, Dec. 24, 1995, retrieved from internet Nov. 22, 2005, http://groups.google,com/group/sci.crypt/msg/485abca33cc29703?dmode=source&hl=en.
  • Posting on mail.cypherpunks, Brandt, Eli, “Re: Timing Attacks”, Dec. 11, 1995, retrieved from internet Dec. 7, 2005, http://groups.google.com/group/mail.cypherpunks/msg/fa276adeb23f2b83?dmode=source.
  • Posting on mail.cypherpunks, Armadillo Remailer, “Re: Timing Attacks”, Dec. 13, 1995, retrieved from internet Nov. 22, 2005, http://groups.google.com/group/mail.cypherpunks/msg/fedb10d2bcf3ff6f?dmod . . . .
  • Posting on mail.cypherpunks, Hoselton, Rick, “Re: Timing Cryptanalysis Attack”, Dec. 14, 1995, retrieved from internet Nov. 22, 2005, http://groups.google.com/group/mail.cypherpunks/msg/470f2482c69f3212?dmo . . . .
  • Declaration of Paul Kocher concerning the 1995 postings, Kocher, Paul, Dec. 16, 2005.
  • Anderson, Ross et al., “Tamper Resistance—a Cautionary Note”, The Second USENIX Workshop on Electronic Commerce Proceedings, Nov. 18-21, 1996, Oakland, Ca.
  • Chaum and Price (Eds.), “IC Cards in High-Security Applications”, Advances in Cryptology—Eurocrypt '87, LNCS 304, Amsterdam, NE (1988), pp. 177-199.
  • Goutay, J., “Smart Card Applications in Security and Data Protection”, Advances in Cryptology—Eurocrypt '84; LNCS 209, Springer-Verlag, Berlin, Germany; (1985) pp. 459-463.
  • Guillou, L.C. et al., “Smart Card, a Highly Reliable and Portable Security Device”, Advances in Cryptology—Crypto '86; LNCS 263, Springer-Verlag, Berlin, Germany; (1987) pp. 464-479.
  • Guillou, L.C. et al., “Smart Cards and Conditional Access”, Advances in Cryptology—Eurocrypt '84; LNCS 209, Springer-Verlag, Berlin, Germany; (1985) pp. 480-489.
  • Guthery, Scott, “Smart Cards”, www.usenix.org/publications/login/1989-5/guthery.html; May 1989.
  • Highland, Harold Joseph, “The Tempest over Leaking Computers”, Abacus, vol. 5(2), Winter 1988, pp. 10-18, 53. http://cryptome.org/tempest-leak.htm.
  • ISO/IEC 7816 International Standard, Geneva, CH: Part 1 Physical Characteristics (Ref. No. ISO/IEC 7816-1:1998(E)), Part 1 Amendment Physical Characteristics (Ref. No. ISO/IEC 7816-1:1998/AMD.1.2003(E)), Part 2 Dimensions and Location of the Contacts (Ref. No. ISO/IEC 7816-2:1999(E)).
  • Krivachy, T., “The Chipcard—An Identification Card with Cryptographic Protection”, Advances in Cryptology—Eurocrypt '85; LNCS 219, Springer-Verlag, Berlin, Germany (1986) pp. 200-207.
  • Kuhn, Markus G. et al., “Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations”, Second Workshop on Information Hiding, Portland, Oregon, Apr. 15-17, 1998.
  • Menzes, A.J. et al., Handbook of Applied Cryptography, Chapters 1, 5 and 7; CRC Press, Boca Raton; Florida (1997).
  • Meyer, Carl H. et al., Cryptography—A New Dimension in Computer Data Security; Ch. 1; John Wiley & Sons, 1982.
  • Rankl et al., Smart Card Handbook, John Wiley & Sons Ltd., 1997, Chs. 2, 3, 8, 13, and pp. 84-89, Chichester, England.
  • Schmidt, Dick, “Visions on Development in Information Security”, TNO Conference, Delft, Netherlands, Oct. 2-3, 1997.
  • Smulders, Peter, “The Threat of Information Theft by Reception of Electromagnetic Radiation from RS-232 Cables”, Computers and Security, vol. 9, pp. 53-58, 1990; Elsevier Science Publishers Ltd.
  • Wakerly, John F., “Introduction to Computers and Programming”, Microcomputer Architecture and Programming: The 68000 Family, John Wiley & Sons, New York, N.Y. (1989), Chapter 1, pp. 1-16.
  • United States Air Force Audio Visual Presentation, “So You Think You're Secure”, Aerospace Audio Visual Service; TF32-4599, 1972; Military Airlift Command; TF 6502.
  • Cryptography Research Inc. v. VISA International Service Association, VISA International Service Association's Answer to Second Amended Complaint and Counterclaims, United States District Court Case No. C 04-04143 JW (HRL), Northern District of California, San Jose Division, Apr. 23, 2007.
  • Cryptography Research Inc. v. VISA International Service Association, Defendant VISA International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,327,661 Pursuant to Patent L.R. 3-6(B), United States District Court Case No. 5:04-CV—04143-JW (HRL), Northern District of California, San Jose Division, Dec. 8, 2006.
  • “Announce: Timing Cryptanalysis of RSA, DH, DSS”, sci.crypt newsgroup postings, Dec. 13-15, 1995.
  • “Digital Signature Standard (DSS)”, Federal Information Processing Standards Publication 186, May 19, 1994, downloaded: Jan. 22, 2007, website: http://www.itl.nist.gov/fipspubs/fip186.htm.
  • “Eurocrypt '97 Rump Session Program”, May 13, 1997, Konstanz, Germany, downloaded: Jan. 29, 2007, website: http://www.iacr.org/conference/ec97/rump.html.
  • “Kocher Algorithm”, sci.crypt newsgroup postings, Google Groupes, Mar. 12, 1996, http://groups.google.fr/group/sci.crypt/browsethread/thread/240f02445602362e/644d5300cdbbf7e3? Ink=gst&q=%q=%22Kocher+Algorithm%22&mum=1&ht=fr#644d5300cdbbf7e3.
  • “Public-Key-Algorithm for Digital Signature”, National Institute of Standards and Technology, Aug. 1991, pp. 553-564 (German translation).
  • Anderson et al., “Robustness Principles for Public Key Protocals”, LNCS 963, Proc. Crypto '95, 1995, pp. 236-247.
  • Anderson, Ross, “Two Remarks on Public Key Cryptology”, Computer Laboratory, University of Cambridge, Technical Report, No. 549, Dec. 2002, ISSN 1476-2986.
  • Beker et al., “Key Management for Secure Electronic Funds Transfer in a Retail Environment”, Proc. Crypto '84, Springer-Verlag, 1998, pp. 401-410.
  • Boneh et al., “On the Importance of Eliminating Errors in Cryptographic Computations”, Journal of Cryptology, 2001, vol. 14, No. 2, pp. 101-119.
  • Bovelander, Ernst, “Smart Card Security ‘How Can We Be So Sure?’”, COSIC '97 Course, Incs 1528, Springer-Verlag, 1998, pp. 333-337.
  • Burmester et al., “A Secure and Efficient Conference Key Distribution System”, LNCS 1189, Proc. International Workshop on Security Protocols, 1996, Springer-Verlag, 1998, pp. 275-286.
  • Daemen, Joan, “Management of Secret Keys: Dynamic Key Handling”, LNCS 1528, Proc. COSIC '97 Course, Springer-Verlag, 1998, pp. 264-276.
  • Frankel et al., “Proactive RSA”, Sandia Report SAND96-0856, Apr. 15, 1996.
  • Gennaro et al., “Robust Threshold DSS Signatures”, LNCS 1070, Proc. Eurocrypt '96, Springer-Verlag, 1998, pp. 354-371.
  • Gillogly et al., “Notes on Crypto '95 Invited Talks by R. Morris and A. Shamir”, Cipher 9, Sep. 18, 1995, http://www.leee-security.org/cipher/confreports/conf-rep-Crypto95.html.
  • Herzberg et al., “Proactive Secret Sharing Or: How to Cope with Perpetual Leakage”, LNCS 963, Proc. Crypto '95, Springer-Verlag, 1998, pp. 339-352.
  • Jablon, David P., “Strong Password-Only Authenticated Key Exchange”, Computer Communication Review, Sep. 25, 1996, vol. 26, No. 5, pp. 5-26.
  • Kocher, P., Message: “Re: Timing cryptanalysis of RSA, DH, DSS (Tomazic, Risks 17.59”, The Risks Digest, Forum on Risks to the Public in Computers and Related Systems, vol. 17: Issue 60, Jan. 3, 1996, downloaded: Jan. 23, 2007, website: http://catless.ncl.ac.uk/Risks/17.60.html.
  • Matsumoto et al., “Speeding Up Secret Computations with Insecure Auxiliary Devices”, LNCS 403, Proc. Crypto '88, Springer-Verlag, 1998, pp. 499-506.
  • Naccache et al., “Can D.S.A. be Improved?” -Complexity Trade-Offs with the Digital Signature Standard-, LNCS 950, Proc. Eurocrypt '94, 1995, Springer-Verlag, 1998, pp. 77-85.
  • Naccache, David, “Can O.S.S. be Repaired?”—Proposal for a New Practial Signature Scheme-, LNCS 765, Proc. Eurocrypt '93, 1994, Springer-Verlag, 1998, pp. 233-239.
  • Naccache, David, “To Whom it May Concern”, Forensic Expert Witness by the Court of Appeal, Paris, Dec. 6, 2006.
  • Quisquater et al., “Fast Decipherment Algorithm for RSA Public-Key Crypptosystem”, Aug. 27, 1982, Electronics Letters Oct. 14, 1982, vol. 18, No. 21, pp. 905-907.
  • Rankl et al., “Smart Card Handbook”, John Wiley & Sons Ltd., 1997, pp. 66-83, 182-189, 208-217, and 237-272.
  • Robshaw et al., “Overview of Elliptic Curve Cryptosystems”, RSA Laboratories Technical Note, revised Jun. 27, 1997, downloaded: Jan. 23, 2007, website: http://www.rsasecurity.com/rsalabs/node/asp?id=2013.
  • Schneier, Bruce, “Applied Cryptography”, 2nd Edition, John Wiley & Sons, Inc., 1996, pp. 525-573 (German translation).
  • Schnorr, C.P., “Efficient Signature Generation by Smart Cards”, Journal of Cryptology, 1991, pp. 161-174.
  • Shamir, Adi, “On the Poser of Commutativity in Cryptography”, LNCS 85, Proc. 7th Colloquia on Automata, Languages and Programming, 1980, pp. 582-595.
  • Steiner et al., “Diffie-Hellman Key Distribution Extended to Group Communication”, Third ACM Conf. Computer and Comm. Security, Mar. 1996, pp. 31-37.
  • Yen et al., “RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis”, IEEE Transactions on Computers, Apr. 2003, vol. 52, No. 4., pp. 461-472.
  • “Patent Abstracts of Japan”, JP 02-187888, downloaded Jan. 10, 2007.
  • “Patent Abstracts of Japan”, JP 05-094458, downloaded Jan. 10, 2007.
  • “Patent Abstracts of Japan”, JP 10-171717, downloaded Jan. 10, 2007.
  • “Patent Abstracts of Japan”, JP 60-146361, downloaded Jan. 10, 2007.
  • “Patent Abstracts of Japan”, JP 62-166489, downloaded Jan. 10, 2007.
  • “Patent Abstracts of Japan”, JP 64-081087, downloaded Jan. 10, 2007.
  • Hevia, Alejandro et al., “Strength of Two Data Encryption Standard Implementations under Timing Attacks”, Lecture Notes in Computer Science 1380—Latin '98: Theoretical Informatics 3rd Latin American Symposium, Campinas, Brazil, Apr. 1998; pp. 192-205.
  • Kocher, Paul, “Differential Power Analysis”, The Risks Digest, vol. 19(80), ACM Committee on Computers and Public Policy, New York, Jun. 10, 1998. http://catless.ncl.ac.uk/Risks/19.80.html.
  • U.S. Appl. No. 11/977,392, Paul C. Kocher et al., filed Jan. 24, 2007.
  • U.S. Appl. No. 11/981,495, Paul C. Kocher et al., filed Oct. 30, 2007.
  • U.S. Appl. No. 11/978,364, Paul C. Kocher et al., filed Oct. 29, 2007.
  • Grounds Of Opposition, European Patent 1092297 in the name of Cryptography Research, Inc., Opposition by Visa Europe Services, Inc., Jan. 25, 2008.
  • Posting on sci.crypt newsgroup, Kocher, Paul C et al., “Announce: Timing cryptanalysis of RSA, DH, DSS” et al., messages 1-51 of 51, Dec. 11, 1995 through Dec. 24, 1995, http://groups.google,com/group/sci.crypt.
  • Daemen, Joan, “Management of Secret Keys: Dynamic Key Handling”, Course on Computer Security and Industrial Cryptography (COSIC '97 - Jun. 1997) Presentation Slides; and declaration of Professor Bart Preneel dated Jun. 15, 2007.
  • Davies & Price, Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd Ed., John Wiley & Sons, New York, NY, 1989, pp. 318-321.
  • Piper, F., Key Management (Part 3.5) ZERGO: Information Security Training Club, Hampshire, U.K., Jan. 1993, Foils 6-18 to 6-30.
  • Piper, F., Declaration of, Jan. 21, 2008, University of London, England.
  • Bradley, S., “Derived Unique Key Per Transaction Schemes,” Some Applications of Mathematics to the Theory of Communications, Ch. 4, pp. 132-199, Ph.D. Thesis, University of London, England, 1994.
  • ISO (International Organization for Standardization), Banking—Key management (retail) , “Part 3: Key life cycle for symmetric ciphers”, ISO 11568-3 First edition; Dec. 1, 1994, pp. 1-16, www.saiglobal.com/shop.
  • American National Standard for Financial Services, secretariat—American Bankers Association (ANS/ABA X9.24-200x), Key Management Using Triple DEA and PKI, revised by Terry Benson, American National Standards Institute, Sep. 12, 2000.
  • Menzes, A.J. et al., Handbook of Applied Cryptography, pp. 71, 586, 636-637, CRC Press, Boca Raton, Florida (1997).
  • Interbank Card Association, PIN Manual: A Guide to the Use of Personal Identification Numbers in Interchange, pp. 61-127, 1979.
  • Sedgewick, Robert, Algorithims, 2nd Ed., Chs. 4 and 11, Addison-Wesley, Arlington, VA, 1988.
  • Brassard, Gilles, “On computationally secure authentication tags requiring short secret shared keys”, Adv. of Crypt.: Proceedings of Crypto-82, D. Chaum, R.L. Rivest, and A.T. Sherman, Eds. Plenum Press, New York, NY, 1982, pp. 79-86.
  • Davies & Price, Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons, New York, NY, 2nd Ed., 1989, 377 pages (entire book).
  • Defendant VISA International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,304,658 Pursuant to Patent L.R. 3-6(b), Feb. 8, 2008, Case No. C04-04143 JW(HRL), U.S. District Court, Northern District of California, San Jose Division.
  • Defendant VISA International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,381,699 Pursuant to Patent L.R. 3-6(b), Feb. 8, 2008, Case No. C04-04143 JW(HRL), U.S. District Court, Northern District of California, San Jose Division.
  • Defendant VISA International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,510,518 Pursuant to Patent L.R. 3-6(b), Feb. 8, 2008, Case No. C04-04143 JW(HRL), U.S. District Court, Northern District of California, San Jose Division.
  • Defendant VISA International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,654,884 Pursuant to Patent L.R. 3-6(b), Feb. 8, 2008, Case No. C04-04143 JW(HRL), U.S. District Court, Northern District of California, San Jose Division.
  • Anderson, Ross & Biham, Eli, “Tiger: A Fast New Hash Function”, Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag, Berlin, Germany, 1996, pp. 89-97.
  • Back, Adam, “non-interactive forward secrecy”, posting to Cypherpunks.Venona.com message board, Sep. 6, 1996. http://cypherpunks.venona.com/date/1996/09/msg00561.html.
  • Draper, Don et al., “Circuit Tchniques in a 266-MHz MMX-Enabled Processor”, IEEE J. Solid State-Circuits, pp. 1650-1664, Nov. 1997.
  • Eberle, Hans & Thacker, Charles P., “A 1 GBIT/Second GAAS DES Chip”, Proceedings of the 1992 IEEE Custom Integrated Circuits Conference, May 3-6, 1992.
  • Eichelberger, E.B. & Bello, S.E., “Differential current switch—High performance at low power”, IBM J. Res. Develop., 35(3):313-320, May 1991.
  • Gonzalez, Jose Luis & Rubio, Antonio, “TCMOS: A Low Noise Power Supply Technique for Digital ICs”, Electronics Letters, 31(16):1338-1339, Aug. 3, 1995.
  • Greub, Hans J. et al., “High-Performance Standard Cell Library and Modeling Technique for Differential Advanced Bipolar Current Tree Logic”, IEEE Journal of Solid-State Circuits, 26(5):749-762, May 1991.
  • Hough, Charles et al., “New Approaches for On-Chip Power Switching Noise Reduction”, Proceedings of the IEEE 1995 Custom Integrated Circuits Conference, May 1-4, 1995, pp. 133-136.
  • Ivey, Peter A. et al, “A Single-Chip Public Key Encryption Subsystem”, IEEE J. Solid-State Circuits, 24(4):1071-1075, Aug. 1989.
  • Jablon, David P., “Strong Password-Only Authenticated Key Exchange”, Computer Communication Review, ACM SIGCOMM, Univ. of MA., pp. 5-26, Sep. 25, 1996.
  • Jarecki, Stanislaw, “Proactive Secret Sharing and Public Key Cryptosystems”, thesis, Massachusetts Institute of Technology, Sep. 1995, Cambridge, MA.
  • Karlsson, Magnus et al., “Implementation of bit-serial adders using robust differential logic,” Proc. IEEE Nordic Event in ASIC Design Conf., NORCHIP'97, Tallin, Estonia, Nov. 10-11, 1997.
  • Larsson, Patrik, “di/dt Noise in CMOS Integrated Circuits”, Analog Integrated Curcuits and Signal Processing, 14:113-129, Kluwer Academic Publishers, Boston, MA, 1997.
  • Lin, Mao-Chao, “Constant Weight Codes for Correcting Symmetric Errors and Detecting Unidirectional Errors”, IEEE Transactions on Computers, 42(11): 1294-1302, Nov. 1993.
  • Loy, James R., “Managing Differential Signal Displacement”, thesis, Rensselaer Polytechnic Institute, Troy, New York, Aug. 1993.
  • Maier, Cliff A. et al., “A 533-MHz BiCMOS Superscalar RISC Microprocessor”, IEEE Journal of Solid-State Circuits, 32(11):1625-1634, Nov. 1997.
  • Maier, Cliff, “High Speed Microprocessor Cache Memory Hierarchies for Yield-Limited Technologies”, dissertation, Rensselaer Polytechnic Institute, Troy, New York, Aug. 1996.
  • Makie-Fukuda, Keiko et al., “Substrate Noise Reduction using Active Guard Band Filters in Mixed-Signal Integrated Circuits”, 1995 Symposium on VLSI Circuits, Digest of Technical Papers, pp. 33-34, Jun. 8-10, 1995.
  • Maleki, M. & Kiaei, S., “Enhancement Source-Coupled Logic for Mixed-Mode VLSI Circuits”, IEEE Transactions on Circuits an Systems-II: Analog and Digital Signal Processing, 39(6):399-402, Jun. 1992.
  • Oklobdzija, Vojin G., “Differential and Pass-Transistor CMOS Logic for High-Performance Systems”, Proc. 21st International Conference on Microelectronics (MIEL '97), 2:803-810, Nis, Yugoslavia, Sep. 14-17, 1997.
  • Schettler, Helmut et al., “A CMOS Mainframe Processor with 0.5-μm Channel Length”, IEEE Journal of Solid-State Circuits, 25(5):1166-1177, Oct. 1990.
  • Schindler, Volker, “High Speed RSA Hardware Based on Low-Power Pipelined Logic”, Dissertation, Institut fur Angewandte Informationsverarbeitung und Kommunikationstechnologie, Graz University of Technology, Graz, Austria, Jan. 1997.
  • Tabor, Jeff F., “Noise Reduction Using Low Weight and Constant Weight Coding Techniques”, dissertation, Massachusetts Institute of Technology, May 11, 1990, Cambridge Massachusetts.
  • Takashima, Daisaburo et al, “Noise Suppression Scheme for Gigabit-Scale and Gigabyte/s Data-Rate LSI's”, IEEE Journal of Solid-State Circuits, 33(2):260-267, Feb. 1998.
  • Tallini, Luca G. & Bose, Bella, “Design of Balanced and Constant Weight Codes for VLSI Systems”, IEEE Transactions on Computers, 47(5):556-572, May 1998.
  • Texas Instruments, SN54LS138, SN54S138, SN74SL138, SN74S138A 3-Line to 8-Line Decoders/Demultiplexers, Texas Instruments, Dallas, Texas, revised Mar. 1988.
  • Wang, L.K. & Chen, Howard H., “On-Chip Decoupling Capacitor Design to Reduce Switching-Noise-Induced Instability in CMOS/SOI VLSI”, Proceedings 1995 IEEE International SOI Conference, pp. 100-101, Oct. 1995.
  • Williams, Ted E. & Horowitz, Mark, “Bipolar Circuit Elements Providing Self-Completion-Indication”, IEEE Journal of Solid-State Circuits, 25(1):309-312, Feb. 1990.
  • Visa International Service Association's Preliminary Invalidity Contentions, Filed in Case C04-4143 JW in US District Court for N. District of California, San Jose Division, Jun. 2, 2005.
  • Kuhn and Anderson, “Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.” Proceedings of the Second International Workshop on Information Hiding, Portland, Oregon, Apr. 1998, pp. 124-142.
  • Menezes, et al., “CRC Handbook of Applied Cryptography”, Boca Raton, Florida: CRC Press LLC, 1996, pp. 591-634.
  • Visa International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,278,783 Filed in Case C04-4143 JW in US District Court for N. District of California, San Jose Division, Jun. 28, 2007.
  • Alon, et al., “Efficient Dynamic-Resharing ‘Verifiable Secret Sharing’ Against Mobile Adversary”, Mar. 25, 1995.
  • Charnes, et al., “Comments on Soviet Encryption Algorithm”, Springer-Verlag, 1998.
  • Maurer, Ueli M., “A Provably-Secure Strongly-Randomized Cipher”, Springer-Verlag, 1998.
  • Meijer and Aki, “Digital Signature Schemes”, May 1982, Extended summary of paper prsented at CRYPTO 81, Santa Barbara, CA, Aug. 1981.
  • Shamir, Adi, “How to Share a Secret”, Communications of the ACM Nov. 1979, vol. 22, No. 11.
  • Visa International Service Association's Final Invalidity Contentions for U.S. Patent No. 6,298,442 Filed in Case C04-4143 JW in US District Court for N. District of California, San Jose Division, Jul. 16, 2007.
  • Brickell, et al., “Fast Exponentiation with Precomputation (Extended Abstract)”, Springer-Verlag, 1998.
  • De Rooij, Peter, “Efficient Exponentiation using Precomputation and Vector Addition Chains”, Springer-Verlag, 1998, possibly a reprint from Advances in Cryptology, EUROCRYPT '94, 1994.
  • Dimitrov, et al., “An Algorithm for Modular Exponentiation”, Information Processing Letters, vol. 66, Issue 3, pp. 155-159, May 15, 1998.
  • Dimitrov, et al., “Two Algorithms for Modular Exponentiation Using Nonstandard Arithmetics”, IEICE Trans. Fundamentals, vol. E78-A, No. 1, Jan. 1995.
  • Gollman, et al., “Redundant Integer Representations and Fast Exponentiation”, Designs, Codes and Cryptography, 7, 135-151, Kluwer Academic Publishers, Boston, MA, 1996.
  • Hong, et al., “New Modular Multiplication Algorithms for Fast Modular Exponentiation”, Springer-Verlag, 1998, from Advances in Cryptology, EUROCRYPT '96, 1996.
  • Jedwab and Mitchell, “Minimum Weight Modified Signed-Digit Representations and Fast Exponentiation”, Electronics Letters, V. 25, No. 17, Aug. 17, 1989.
  • Koç, çetin K., “High-Radix and Bit Recoding Techniques for Modular Exponentiation”, Intern. J. Computer Math, v. 40 pp. 139-156, 1991, Gordon and Breach Science Publishers, S.A. (UK).
  • E{hacek over (g)}ecio{hacek over (g)}lu and Koç, “Exponentiation using Canonical Recoding,” Theoretical Computer Science 129, pp. 407-417, Elsevier, 1994.
  • Koç, çetin K., “High-Speed RSA Implementation”, RSA Laboratories, Nov. 1994.
  • Lim and Lee, “More Flexible Exponentiation with Precomputation”, Advances in Cryptology, Springer-Verlag, 1998 possibly from CRYPTO '94, Aug. 1994.
  • Defendant Visa International Service Association's Final Invalidity Contentions for U.S. Patent 6,539,092, Filed in Case C04-4143 JW on Nov. 21, 2007, in US District Court for N. District of California, San Jose Division, including exhibits A through C17.
  • Beker, H.J. et al., “Simplifying Key Management in Electronic Fund Transfer Point of Sale Systems”, Electronics Letters, 19(20):442-444, Jun. 9, 1983.
  • Blum, L. et al., “A Simple Unpredictable Pseudo-Random Number Generator”, Siam J. Comput., 13(2):364-383, May 1986.
  • Daemen, Joan, “Management of Secret Keys: Dynamic Key Handling”, COSIC '97 Course, LNCS 1528, Springer-Verlag, Berlin Heidelberg, Germany, 1998, pp. 262-276.
  • Daemen, Joan et al., “The Block Cipher SQUARE”, Fast Software Encryption '97, LNCS, 1267, Springer-Verlag, Berlin Heidelberg, Germany, 1997; pp. 1-19.
  • ISO (International Organization for Standardization), “Banking—Key management (retail)—Part 2: Key management techniques for symmetric ciphers”, ISO 11568-2 First edition Dec. 1, 1994, pp. 1-16, www.saiglobal.com/shop.
  • Naccache, David, Declaration of Professor David Naccache, with regards to his attendance during Adi Shamir's talk titled “How to Check Modular Exponentiation” at the rump session of Eurocrypt 1997, held on May 13, 1997, Paris, France; date of declaration: Dec. 6, 2006.
  • Meyer, Carl H. et al., Cryptography—A New Dimension in Computer Data Security, pp. 100-105, 457-464, and 486, John Wiley & Sons, 1982; New York, NY.
  • Kocher, Paul, “Protection Against DPA and Related Attacks”, Electronics World, pp. 32-36, Mar. 2008; United Kingdom.
  • Black, Coral Elizabeth, “Witness Statement of Coral Elizabeth Black”, Opposition: Cryptography Research Inc.'s European patent 1 050 133 B1, Jun. 26, 2008, setting the public divulgation date of a previously cited reference as Feb. 7, 1995; United Kingdom.
  • Brief Communication from the European Patent Office dated Aug. 11, 2008, enclosing “Further Submission on the Second Opponent's Opposition” to EP 1 150 133 B1, Aug. 1, 2008, London, England.
  • Schneier, Bruce, Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C, Chapter 16.3, pp. 379-381, John Wiley & Sons, Inc., New York, NY, 1996.
  • Notice & Grounds of Opposition of VISA Europe Services, Inc. against European Patent 1 050 133, vol. 1, Feb. 2, 2007.
  • Notice of Opposition to European Patent of Infineon Technologies, AG,. against European Patent 1 050 133, Feb. 3, 2007 (in the German language).
  • Notice of Opposition to European Patent of NXP B.V. against European Patent 1 050 133, Feb. 5, 2007.
  • Notice & Grounds of Opposition of VISA Europe Services, Inc. against European Patent 1 050 133, vol. 2, Feb. 1, 2007.
  • Letter from Infineon Technologies, AG to the European Patent Office calling for the revocation of European Patent 1 050 133, Feb. 3, 2007 (in the English language).
  • Notice of Opposition to European Patent of NXP B.V. against European Patent 1 088 295, May 15, 2008.
  • Letter from NXP B.V. to the European Patent Office concerning the Oral Proceedings against European Patent 1 050 133, Oct. 2, 2008.
  • Stewart, Bill, Declaration of Bill Stewart regarding his newsgroup posting on Dec. 13, 1995, signed in Mountain View CA, on Oct. 2, 2008.
  • Stewart, Bill et al., “Announce: Timing cryptanalysis of RSA, DH, DSS”, posting on Google Groups sci.crypt, Dec. 13, 1995, http://groups.google.de/group/sci.crypt/browse.
  • Stewart, Bill, “Potential defense against timing attack on Diffie-Hellman”, postings on Cypherpunks, Dec. 12-13, 1995, http://diswww.mit.edu/menelaus/cpunks/45312.
  • European Patent Office, “Communication of a notice of opposition” to European patent 1 084 543 by NXP B.V., Oct. 31, 2008.
  • Naccache, David & M'Raihi, David, “Cryptographic Smart Cards”, IEEE Micro 16(3):14-24, Jun. 1996.
  • Intel & Microsoft Corporations, “Advanced Power Management (APM); BIOS Interface Specification”, Rev. 1.2, pp. 4, 5, and 8, Feb. 1996, U.S.A.
  • Nordman, Bruce et al., “User Guide to Power Management for PCs and Monitors”, Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, University of California, pp. 5 and 9-14, Jan. 1997, Berkeley, CA.
  • Cryptography Research Inc., Observations on Oppositions filed to EP 1050133, Nov. 13, 2007.
  • European Patent Office, Summons to attend oral proceedings pursuant to Rule 115(1) EPC regarding EP 1050133, including the EPO's preliminary opinion, Jun. 16, 2008.
  • Cryptography Research Inc., Oppositions to EP 1050133 of Cryptography Research Inc., Submissions by the Proprietor in response to the Summons to attend Oral Proceedings, Oct. 2, 2008.
  • NXP B.V., letter withdrawing its opposition to EP 1050133, Nov. 4, 2008.
  • Visa Europe Services, Inc. letter withdrawing its opposition to EP 1050133, Sep. 9, 2008.
  • Infineon Technologies AG, letter withdrawing its opposition to EP 1050133, Aug. 14, 2008.
  • Cryptography Research Inc., letter from Aidan Robson to EPO regarding EP 1050133, Nov. 13, 2008.
  • NXP B.V., letter withdrawing its opposition to EP 1084543, Nov. 4, 2008, Dusseldorf, Germany.
  • Visa Europe Services, application for re-establishment of rights pursuant to Article 122 EPC in EP 1092297, Mar. 20, 2008, London, U.K.
  • EPO, Decision of the Technical Board of Appeal 3.4.02 in EP application No. 00935973.8, May 9, 2008.
  • Visa Europe Services, letter from opponents informing EPO of withdrawal of opposition to EP 1092297, Sep. 9, 2008, London, U.K.
  • EPO, Communication regarding Visa Europe Services Opposition to EP 1092297, Mar. 3, 2008, Munich, Germany.
  • EPO, Communication to the parties concerning termination of opposition proceedings in EP 1092297, Sep. 24, 2008, Munich, Germany.
  • Infineon Technologies AG, letter withdrawing its opposition to EP 1088295, Aug. 14, 2008, Munich, Germany.
  • European Patent Office, Interlocutory decision in Opposition proceedings, EP 1050133, Dec. 1, 2008, Munich, Germany.
Patent History
Patent number: 7506165
Type: Grant
Filed: Apr 29, 2002
Date of Patent: Mar 17, 2009
Patent Publication Number: 20030028771
Assignee: Cryptography Research, Inc. (San Francisco, CA)
Inventors: Paul C. Kocher (San Francisco, CA), Joshua M. Jaffe (San Francisco, CA)
Primary Examiner: Gilberto Barron, Jr.
Assistant Examiner: Abdulhakim Nobahar
Attorney: Sonnenschein Nath & Rosenthal LLP
Application Number: 10/136,012
Classifications
Current U.S. Class: Intelligent Token (713/172); Including Intelligent Token (e.g., Electronic Purse) (705/65)
International Classification: G06F 21/00 (20060101);